The email texts and the xlsb attachment change slightly. This contacts a url and has so far downloaded remcosrat in one case and Trickbot in the other.
The cybersecurity experts: Customers will automatically mitigate CVE-2021-26855 on any server on which it is deployed. However, it’s not a replacement for the patch.
Palo Alto Networks cybersecurity experts: The malware uses AES-256 and RSA-2048 to encrypt files, and the ransom note includes 2 email addresses to contact for pay.
Intezer cybersecurity experts: It’s a backdoor linked to the Chinese state-sponsored hacking collective Winnti. It has meny capabilities and can be updated.
The email zip attachment, password protected, contains a doc that downloads the dll and starts the malware infection. However, the macro contains errors.