General

  • Target

    3be446dc01245ef559d5407ca04f45232a54a4f3ff46b3d334940b7213455c2a

  • Size

    24KB

  • Sample

    210312-28v2v9d7w2

  • MD5

    65c035cbf062176bb796cccab12cb71f

  • SHA1

    7850f7302be1794ad1afa5b75c3737de629a423d

  • SHA256

    3be446dc01245ef559d5407ca04f45232a54a4f3ff46b3d334940b7213455c2a

  • SHA512

    1ce80a1c59922f7cd4fc759147f35e32cd33e1eb7f5532b1eae464b9b041ea48ebcbf47b501cc680708b4398e86d4dbb878dac24fd0bb2409bb1061f07fa3109

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fernandogaleano.com/server.php

xlm40.dropper

https://tcommerceshop.com/server.php

Targets

    • Target

      3be446dc01245ef559d5407ca04f45232a54a4f3ff46b3d334940b7213455c2a

    • Size

      24KB

    • MD5

      65c035cbf062176bb796cccab12cb71f

    • SHA1

      7850f7302be1794ad1afa5b75c3737de629a423d

    • SHA256

      3be446dc01245ef559d5407ca04f45232a54a4f3ff46b3d334940b7213455c2a

    • SHA512

      1ce80a1c59922f7cd4fc759147f35e32cd33e1eb7f5532b1eae464b9b041ea48ebcbf47b501cc680708b4398e86d4dbb878dac24fd0bb2409bb1061f07fa3109

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks