General

  • Target

    aefebee74f868174371b6f9925e3484198f01753d2e1ed58c2b99a6c2e24de08

  • Size

    84KB

  • Sample

    220113-wld89sbhf2

  • MD5

    5ce92efac8873c1913e3a32f7d6aa2bb

  • SHA1

    86464f602f3852e5d6c681d94a30b2b841eac9a3

  • SHA256

    aefebee74f868174371b6f9925e3484198f01753d2e1ed58c2b99a6c2e24de08

  • SHA512

    a467f66b67c3ba0eab017c60c619b4635500f42f0dbe98b3632d625e862ac3d980f7ddae17c9b81e7be132a54f006581593d737eab10ee9ac4ca047721d854fb

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://dichnghiatienganh.com/jvmqawn/BxWl97O8xLgnzr/

xlm40.dropper

http://mindfulness-travels.com/wp/1bifhHeHUU8eAeRl/

xlm40.dropper

http://recont.com/n8xbqb/5H86niA5y/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://dichnghiatienganh.com/jvmqawn/BxWl97O8xLgnzr/

Targets

    • Target

      aefebee74f868174371b6f9925e3484198f01753d2e1ed58c2b99a6c2e24de08

    • Size

      84KB

    • MD5

      5ce92efac8873c1913e3a32f7d6aa2bb

    • SHA1

      86464f602f3852e5d6c681d94a30b2b841eac9a3

    • SHA256

      aefebee74f868174371b6f9925e3484198f01753d2e1ed58c2b99a6c2e24de08

    • SHA512

      a467f66b67c3ba0eab017c60c619b4635500f42f0dbe98b3632d625e862ac3d980f7ddae17c9b81e7be132a54f006581593d737eab10ee9ac4ca047721d854fb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks