General

  • Target

    5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888

  • Size

    113KB

  • Sample

    220112-c9k7yaagb3

  • MD5

    7b10abef408978ea69c704e29e2e797a

  • SHA1

    d5cec5db6eacae468496669bb602195e1d5b5cbd

  • SHA256

    5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888

  • SHA512

    ca797e6b8bb612dd4e94c36cf7f8f846014ec2b4884949c9b4d9e2901273930a0c5fc3a82ad0135226886e1e266f0afff4b051fe9a4fb8d018d4526e15c38a02

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/

xlm40.dropper

http://old.liceum9.ru/images/0/

xlm40.dropper

http://ostadsarma.com/wp-admin/pYk64Hh3z5hjnMziZ/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/

Targets

    • Target

      5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888

    • Size

      113KB

    • MD5

      7b10abef408978ea69c704e29e2e797a

    • SHA1

      d5cec5db6eacae468496669bb602195e1d5b5cbd

    • SHA256

      5c2972a5491e6d8209aa42964c99ad4f8621686005fbc5e1836b4b18d165a888

    • SHA512

      ca797e6b8bb612dd4e94c36cf7f8f846014ec2b4884949c9b4d9e2901273930a0c5fc3a82ad0135226886e1e266f0afff4b051fe9a4fb8d018d4526e15c38a02

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks