General

  • Target

    06bae6b222d9d875a6599e6da4f4fcdcfa6975653215b6a0d9d188382e0ee2f0

  • Size

    113KB

  • Sample

    240831-z7k6gswejq

  • MD5

    44b19fc33802848f0c3dea55950dd8c5

  • SHA1

    811db84fe6785bb79fdca9ffeae3f857479e3a59

  • SHA256

    06bae6b222d9d875a6599e6da4f4fcdcfa6975653215b6a0d9d188382e0ee2f0

  • SHA512

    2569a47a1fe42faad94bc024287e157e0b35c8d8f29ed0c58d4a0b6843da630dcfb1ef6862942e7d9eac4a6ae68439da08bd0898d59d0c22171e963d9330bbea

  • SSDEEP

    3072:QKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgKFyVEdBU6hubsll6UQjvxh:QKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg2M

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/

xlm40.dropper

http://old.liceum9.ru/images/0/

xlm40.dropper

http://ostadsarma.com/wp-admin/pYk64Hh3z5hjnMziZ/

Targets

    • Target

      06bae6b222d9d875a6599e6da4f4fcdcfa6975653215b6a0d9d188382e0ee2f0

    • Size

      113KB

    • MD5

      44b19fc33802848f0c3dea55950dd8c5

    • SHA1

      811db84fe6785bb79fdca9ffeae3f857479e3a59

    • SHA256

      06bae6b222d9d875a6599e6da4f4fcdcfa6975653215b6a0d9d188382e0ee2f0

    • SHA512

      2569a47a1fe42faad94bc024287e157e0b35c8d8f29ed0c58d4a0b6843da630dcfb1ef6862942e7d9eac4a6ae68439da08bd0898d59d0c22171e963d9330bbea

    • SSDEEP

      3072:QKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgKFyVEdBU6hubsll6UQjvxh:QKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg2M

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks