General

  • Target

    633b6eb1a96cc31e856517af38dc073f90ac713e71f8d0c68a9601dc14e15d3b.zip

  • Size

    80KB

  • Sample

    240418-bsczkafa82

  • MD5

    d9b92f3caab95161dd7120986d37666c

  • SHA1

    8f1e0ccadd76e862b961e8dd4b84494d800b6665

  • SHA256

    633b6eb1a96cc31e856517af38dc073f90ac713e71f8d0c68a9601dc14e15d3b

  • SHA512

    2ceeb76e2a29930fb7fbb6477f85ca2b5e63cc467fe27d3e398eb28eb90341133831227801bed0e246c6aa2a416fac1c10eb7c703869ed221a2a174c2dd77220

  • SSDEEP

    1536:GRW8VpIkrpw4czIuhhL1fvrRZxuhm5KZxWjAv/zy4F3zBKsdbwhD38FH+:GRW8Vf10PrRruhmuxW54FjksCDs1+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://metaflip.io/ds/3003.gif

xlm40.dropper

https://partsapp.com.br/ds/3003.gif

xlm40.dropper

https://columbia.aula-web.net/ds/3003.gif

xlm40.dropper

https://tajushariya.com/ds/3003.gif

xlm40.dropper

https://agenbolatermurah.com/ds/3003.gif

Targets

    • Target

      d86405130184186154daa4a5132dd1364ab05d1f14034c7f0a0cda690a91116d

    • Size

      105KB

    • MD5

      e7c614f4eb6aa532c189c76d87a8862b

    • SHA1

      191eda0c539d284b29efe556abb05cd75a9077a0

    • SHA256

      d86405130184186154daa4a5132dd1364ab05d1f14034c7f0a0cda690a91116d

    • SHA512

      1ab9b883f1e57bcda44657797bc543f995a30a66ea4a57891518c0ff455ff527d3a7c50bddd69e2365a651a2918623b9b02b5143da15389489f5f2a3d97107fe

    • SSDEEP

      3072:e2CxNFcWr5qQDzPjEwqtDpko+bJ99K7meX7pD/:ezxjYDj+d9imeX7pD/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks