General

  • Target

    cc262670de9e79eaf84de6b47a7ebaa5951b802b50e0546ba9e7a5391857bde6

  • Size

    84KB

  • Sample

    210712-rx4h13k22e

  • MD5

    9872ef509ac3ce7f3d3ba9ba2adafc54

  • SHA1

    637965b8693db22a001675368d407b44f378e6b3

  • SHA256

    cc262670de9e79eaf84de6b47a7ebaa5951b802b50e0546ba9e7a5391857bde6

  • SHA512

    3bd079b5a1c04624a234f20d1216504d7f87615816336ae2dfef621129b7aea28d5bee218b9204e26cd9f46f97354575311349422e0fe2f4ccfe9c519ccd0ef6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://45.89.127.118/images/longearthgrinch.png

Targets

    • Target

      cc262670de9e79eaf84de6b47a7ebaa5951b802b50e0546ba9e7a5391857bde6

    • Size

      84KB

    • MD5

      9872ef509ac3ce7f3d3ba9ba2adafc54

    • SHA1

      637965b8693db22a001675368d407b44f378e6b3

    • SHA256

      cc262670de9e79eaf84de6b47a7ebaa5951b802b50e0546ba9e7a5391857bde6

    • SHA512

      3bd079b5a1c04624a234f20d1216504d7f87615816336ae2dfef621129b7aea28d5bee218b9204e26cd9f46f97354575311349422e0fe2f4ccfe9c519ccd0ef6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks