General

  • Target

    d329f556697ed3f9b10527e039d11cca74741b70d8a5083e3ff7d6a26d059a07

  • Size

    44KB

  • Sample

    240913-gcpajsxekh

  • MD5

    a938487b8872227b51f3e2bf117d27ae

  • SHA1

    fd94e7479dd2e2e8380e660da5af91a8e868fa6a

  • SHA256

    d329f556697ed3f9b10527e039d11cca74741b70d8a5083e3ff7d6a26d059a07

  • SHA512

    5b16b525615998fb75660e75a098e8650593842f9e3dc2c69a62d76922b3e0d16e020bd9b7872c25abbe04ec3dd969b37d9f647260b8747bd9a1768328cbd347

  • SSDEEP

    768:qPXk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJWL6uShYUQgcUcwWNvW1Tpl3ZeD:+Xk3hbdlylKsgqopeJBWhZFGkE+cL2N/

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://gogaurav.com/lkcvjw.php

xlm40.dropper

https://wfduino.com/pcwblt.php

xlm40.dropper

https://susansquires.com/2014-style2.php

xlm40.dropper

https://animalbliss.com/xmlpl.php

Targets

    • Target

      d329f556697ed3f9b10527e039d11cca74741b70d8a5083e3ff7d6a26d059a07

    • Size

      44KB

    • MD5

      a938487b8872227b51f3e2bf117d27ae

    • SHA1

      fd94e7479dd2e2e8380e660da5af91a8e868fa6a

    • SHA256

      d329f556697ed3f9b10527e039d11cca74741b70d8a5083e3ff7d6a26d059a07

    • SHA512

      5b16b525615998fb75660e75a098e8650593842f9e3dc2c69a62d76922b3e0d16e020bd9b7872c25abbe04ec3dd969b37d9f647260b8747bd9a1768328cbd347

    • SSDEEP

      768:qPXk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJWL6uShYUQgcUcwWNvW1Tpl3ZeD:+Xk3hbdlylKsgqopeJBWhZFGkE+cL2N/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks