General

  • Target

    a0b3928c06fa88bd4e5085123e7b28230983485268a27a15b7deca7738833701

  • Size

    352KB

  • Sample

    230129-x3gw6aag27

  • MD5

    3123eb70dad483478fb29453667a5d9a

  • SHA1

    2d65feaa4101663ce74db9a50cf6867bce6f2c6a

  • SHA256

    a0b3928c06fa88bd4e5085123e7b28230983485268a27a15b7deca7738833701

  • SHA512

    45cce880bd6f2ab651df0693d69fe426420a77cda276db70d4a6ac17e4ba0549d8ca37d598520adcafd517141b18176da4cc2eb7edb7b89e1baa9d46775947d9

  • SSDEEP

    6144:ATq1jURRRY1QzB8WTXgmKjNNt9MxBJd6E3MsUbsXmR6hSJi6qnK:ui1QzB8WTyjNpMesUbsXmR6hS06qnK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://powerdust.digital/g

Targets

    • Target

      a0b3928c06fa88bd4e5085123e7b28230983485268a27a15b7deca7738833701

    • Size

      352KB

    • MD5

      3123eb70dad483478fb29453667a5d9a

    • SHA1

      2d65feaa4101663ce74db9a50cf6867bce6f2c6a

    • SHA256

      a0b3928c06fa88bd4e5085123e7b28230983485268a27a15b7deca7738833701

    • SHA512

      45cce880bd6f2ab651df0693d69fe426420a77cda276db70d4a6ac17e4ba0549d8ca37d598520adcafd517141b18176da4cc2eb7edb7b89e1baa9d46775947d9

    • SSDEEP

      6144:ATq1jURRRY1QzB8WTXgmKjNNt9MxBJd6E3MsUbsXmR6hSJi6qnK:ui1QzB8WTyjNpMesUbsXmR6hS06qnK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks