Errors

Reason
office: non-rc4 encrypted document not supported
Reason
office: non-rc4 encrypted document not supported

General

  • Target

    infected20241003.zip

  • Size

    21.1MB

  • MD5

    4f683ea6758686eb7d24ff3414212fdc

  • SHA1

    6c142b67527d954855519c22c1605bcee1557776

  • SHA256

    d07c95e8960c8d0a4de79e97afbbb836d73b8869dda97917bce1d0fa4ef88195

  • SHA512

    35561ab1d0bec21b2f2b5e6a071e0d9c89dfa9f6050e44b60dab06f2f1d10c6bff3421609ea3fcbcd79415593672aaf319896559653171bccab1f4d13abdb8b4

  • SSDEEP

    393216:RZfXx8TEAaz6PcwBb/1nQOjg4zfGv+sw7KOqxFTimGehtwq7BS44GPo:RZvx3AazEcwBb/dMaGrw7KOqPtL5o

Score
10/10

Malware Config

Signatures

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Unsigned PE 8 IoCs

    Checks for missing Authenticode signature.

Files

  • infected20241003.zip
    .zip

    Password: infected

  • 0c5b00311b9e7f3e749e8f2c2bb639ee32f2de89bedf1c572391dedcdd10765e.exe
    .exe windows:10 windows x86 arch:x86

    Password: infected

    646167cce332c1c252cdcb1839e0cf48


    Code Sign

    Headers

    Imports

    Sections

  • 1618780b8570f9b44fdd73513c6aa8069eb8a9151a22d83b178c5be6eb125013.vbs
    .vbs
  • 31d2bac123d451caed79ced03b80592dacc3499f6c91a9e32630d3590d52a6c0.exe
    .exe windows:1 windows x86 arch:x86

    Password: infected


    Headers

    Sections

  • 3e0a6e80d4427d22bc807628032ba1e1fbf9b733a8b5db26f5c2cc2bae55bb1c.xls
    .xls windows office2003
  • 5489a717a23f4b7e2f250429554bd8a3d744970e1bfabe2162c9eb2fa8c04df8.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • 63f2e49bd14880bed0033cbf0878ee50f18555432d3ad1439b304e6a2dc00fc6.msi
    .msi
  • 719d53c1064f54fd79ea4a7844f079d2.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected

    be41bf7b8cc010b614bd36bbca606973


    Headers

    Imports

    Sections

  • $TEMP/Giving
  • $TEMP/Share
  • FilesInstructional/Characteristic
  • FilesInstructional/Hottest
  • FilesInstructional/Overview
  • FilesInstructional/Readers
  • FilesInstructional/Subsequently
  • FilesInstructional/Summaries
  • FilesInstructional/Zen
  • FlyingNumbers/Funk
  • 8411add8ba814509886e7ce5baee8e338f5955037623c768747cbc1b7ecc1de8.exe
    .dll windows:6 windows x64 arch:x64

    Password: infected

    9c56e55a78583f51602c505c8cbe5c9e


    Headers

    Imports

    Exports

    Sections

  • 88b07657500a548ed8476fa415896d2179c307d4751917ca892119c3fff120b0.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • 9cb1756afd35b77acc762f550857e271.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected

    5e541f0ed19da8c67474afeab35f1a51


    Headers

    Imports

    Sections

  • IEnetbookupdation.hta
    .html .js polyglot
  • REP_89419812646634117.doc
    .doc windows office2003

    Frjpossu

    Xhrcwkmbidam

    Yokxdhzeadumj

  • d472c895106cfebcb6eea8701416aed96b9770c256432ee7ee7a9b8a60a6d254.xls
    .xls windows office2003
  • dcc72f90c1d3aac382ba8965c68109986771562f49d4112c5be1a0e9b645f621.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected

    870b8e75c7190e202e9c6c81dff1040c


    Headers

    Imports

    Sections

  • file.exe
    .exe windows:5 windows x86 arch:x86

    2eabe9054cad5152567f0699947a2c5b


    Headers

    Imports

    Sections