General

  • Target

    852b07ca2ec5f28c81e5c080ce455a46c4feb575cb0fdb77f6a9f254e109ed02

  • Size

    352KB

  • Sample

    230129-x3kcaaag32

  • MD5

    37e629a0c2b32332d5197b213a58de8e

  • SHA1

    63906165cacdbdc2542b685216c8aadf857509a5

  • SHA256

    852b07ca2ec5f28c81e5c080ce455a46c4feb575cb0fdb77f6a9f254e109ed02

  • SHA512

    05c1d5ca6292ee5d32931b6eefcd414a2841cfd17b9e369220e9f62af70e252eb940361a26450625462ef421c38068b5f9836301113afea612ce9a16271cbc58

  • SSDEEP

    6144:ATq1jURRRY1QzB8WTXgmKjNNt9MxBJd6E3MsUbsXmR6hSJi6qnF:ui1QzB8WTyjNpMesUbsXmR6hS06qnF

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://powerdust.digital/g

Targets

    • Target

      852b07ca2ec5f28c81e5c080ce455a46c4feb575cb0fdb77f6a9f254e109ed02

    • Size

      352KB

    • MD5

      37e629a0c2b32332d5197b213a58de8e

    • SHA1

      63906165cacdbdc2542b685216c8aadf857509a5

    • SHA256

      852b07ca2ec5f28c81e5c080ce455a46c4feb575cb0fdb77f6a9f254e109ed02

    • SHA512

      05c1d5ca6292ee5d32931b6eefcd414a2841cfd17b9e369220e9f62af70e252eb940361a26450625462ef421c38068b5f9836301113afea612ce9a16271cbc58

    • SSDEEP

      6144:ATq1jURRRY1QzB8WTXgmKjNNt9MxBJd6E3MsUbsXmR6hSJi6qnF:ui1QzB8WTyjNpMesUbsXmR6hS06qnF

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks