General

  • Target

    a0be39f90b88de0ee897ed6b1dfb1310

  • Size

    78KB

  • Sample

    240224-c8b8mseh58

  • MD5

    a0be39f90b88de0ee897ed6b1dfb1310

  • SHA1

    0a5e389d3b8f69e658a9ede173efa567ecc87342

  • SHA256

    fbb54ec38910578ba27f1d659affc4477195e03a80e2c16c18017d5242e57a48

  • SHA512

    2e7d838a59056fcfa4fdcb326b371eb8b99e9c291d22d5fa1ce9c9facce99d517d8c3d105195e7f087cd1afc137cb158a7b94db3ddea5710b2408f00e2cee53d

  • SSDEEP

    1536:Dk3hOdsylKlgryzc4bNhZFGzE+cL2knAC46ejLSYs/02Q:Dk3hOdsylKlgryzc4bNhZFGzE+cL2knW

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://134.119.191.48/0Owp8enEK9ql.php

Targets

    • Target

      a0be39f90b88de0ee897ed6b1dfb1310

    • Size

      78KB

    • MD5

      a0be39f90b88de0ee897ed6b1dfb1310

    • SHA1

      0a5e389d3b8f69e658a9ede173efa567ecc87342

    • SHA256

      fbb54ec38910578ba27f1d659affc4477195e03a80e2c16c18017d5242e57a48

    • SHA512

      2e7d838a59056fcfa4fdcb326b371eb8b99e9c291d22d5fa1ce9c9facce99d517d8c3d105195e7f087cd1afc137cb158a7b94db3ddea5710b2408f00e2cee53d

    • SSDEEP

      1536:Dk3hOdsylKlgryzc4bNhZFGzE+cL2knAC46ejLSYs/02Q:Dk3hOdsylKlgryzc4bNhZFGzE+cL2knW

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks