General

  • Target

    85eaa7c76ac760942ec51174ce065dc01872d85a93aa24d4d036764426efe0dd

  • Size

    95KB

  • Sample

    241111-vjqzlssblq

  • MD5

    b1cce5cf15f68cb3a78350ed11395684

  • SHA1

    c3ae992d3b0caecfc4cf25d271555bc477abbcd1

  • SHA256

    85eaa7c76ac760942ec51174ce065dc01872d85a93aa24d4d036764426efe0dd

  • SHA512

    39fa69c0e8c0e9dfb7d79a305eaae33d4eb0323e722bc629351f3caee9f3a6353f1a5301652dd37c3f12141ecc960e6768f82927c874d03fcb25f62f9be9c9fd

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgcHuS4hcTO97v7UYdEJmEt:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://dazzlecollections.co.za/THDXpHbk3YwA/HTolLw1ams3x/

xlm40.dropper

http://www.daxberger.at/stats/NfxCfPkIhjZqEvLMN2Ul/

xlm40.dropper

http://k-s-j.jp/contact/r3a9keM/

xlm40.dropper

http://kentandcowines.com.au/wp-content/nkz1FRU9Y5i/L/

Targets

    • Target

      85eaa7c76ac760942ec51174ce065dc01872d85a93aa24d4d036764426efe0dd

    • Size

      95KB

    • MD5

      b1cce5cf15f68cb3a78350ed11395684

    • SHA1

      c3ae992d3b0caecfc4cf25d271555bc477abbcd1

    • SHA256

      85eaa7c76ac760942ec51174ce065dc01872d85a93aa24d4d036764426efe0dd

    • SHA512

      39fa69c0e8c0e9dfb7d79a305eaae33d4eb0323e722bc629351f3caee9f3a6353f1a5301652dd37c3f12141ecc960e6768f82927c874d03fcb25f62f9be9c9fd

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgcHuS4hcTO97v7UYdEJmEt:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks