General

  • Target

    292b174c3de7059e5a50bfb7cf1adc5db64d25e5919b0b222a0f2f0b814251e4

  • Size

    88KB

  • Sample

    240902-1vvd3azamd

  • MD5

    780c4bbe03d09d89e9dd811074beb5ea

  • SHA1

    a5c8429ae1a1eb8226751a4dda9f684bf71f72e9

  • SHA256

    292b174c3de7059e5a50bfb7cf1adc5db64d25e5919b0b222a0f2f0b814251e4

  • SHA512

    c4c07e668b17c39a54fe458a6bd5a838b43c7546d7049290043cc1d5041bf2775c67652b80aff8f0b0212278bff64745043ff8da8a8de0945ad52487101d3a2e

  • SSDEEP

    1536:j5Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgR91vrVmxJiME2GhdD52lZPFu1AOgI+l5:VKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://sco.com.br/dPB0iPit6f8/b.html

xlm40.dropper

https://brunodinizitatiaia.com.br/eHOVauZU/b.html

xlm40.dropper

https://soccer-assist.co.uk/57IsaduJ/b.html

Targets

    • Target

      292b174c3de7059e5a50bfb7cf1adc5db64d25e5919b0b222a0f2f0b814251e4

    • Size

      88KB

    • MD5

      780c4bbe03d09d89e9dd811074beb5ea

    • SHA1

      a5c8429ae1a1eb8226751a4dda9f684bf71f72e9

    • SHA256

      292b174c3de7059e5a50bfb7cf1adc5db64d25e5919b0b222a0f2f0b814251e4

    • SHA512

      c4c07e668b17c39a54fe458a6bd5a838b43c7546d7049290043cc1d5041bf2775c67652b80aff8f0b0212278bff64745043ff8da8a8de0945ad52487101d3a2e

    • SSDEEP

      1536:j5Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgR91vrVmxJiME2GhdD52lZPFu1AOgI+l5:VKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks