General

  • Target

    57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0

  • Size

    46KB

  • Sample

    240911-1n89msvckk

  • MD5

    09bc237236bc1b00cb08555a8c8e7fcc

  • SHA1

    6adbada8ff6967c3ff445ea39c2b4e59382a3b6a

  • SHA256

    57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0

  • SHA512

    d86da1405e765ef1a21b9dac5b3f1d5f7f0e7d060637e27d07924e9bb215921b761200956b1a6c74b32e3e22e29d99da4a37ea5525ca7c9d5017c401dd6ed468

  • SSDEEP

    768:LDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VmQs7iqj/X20eu2p:LYKpb8rGYrMPe3q7Q0XV5xtezE8vG8U1

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.yedirenkajans.com/eski/y91J/

xlm40.dropper

http://yahir-fz.com/joy/ZnIjgkgZ18/

xlm40.dropper

http://www.wahkiulogistics.com.hk/upload/AvtsILsT00O/

Targets

    • Target

      57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0

    • Size

      46KB

    • MD5

      09bc237236bc1b00cb08555a8c8e7fcc

    • SHA1

      6adbada8ff6967c3ff445ea39c2b4e59382a3b6a

    • SHA256

      57abba3a5175ff7eefe3e2547cc27d0ccb62282fda8443f2281dfcbe8b6b32c0

    • SHA512

      d86da1405e765ef1a21b9dac5b3f1d5f7f0e7d060637e27d07924e9bb215921b761200956b1a6c74b32e3e22e29d99da4a37ea5525ca7c9d5017c401dd6ed468

    • SSDEEP

      768:LDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VmQs7iqj/X20eu2p:LYKpb8rGYrMPe3q7Q0XV5xtezE8vG8U1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks