General

  • Target

    cbc656e032d2736a6bbc377af94442c9c2233cbb56cd0caf029e08273993a60f

  • Size

    95KB

  • Sample

    241111-w1k1cstbrj

  • MD5

    91d721c5f5f9a1984d471ade79e181d4

  • SHA1

    9526ae2b514802582260ded72575f23675e80d96

  • SHA256

    cbc656e032d2736a6bbc377af94442c9c2233cbb56cd0caf029e08273993a60f

  • SHA512

    201ba3e3bc22660a533bb340bb810177939d1f76bb42276ff0fa2c451f3e5e895a67bca8b0da92802e048d25d76eeed7cdf1d11866019dda79f6d9885372561d

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCg+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgq

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://francite.net/images/XI7zS0X1nY/

xlm40.dropper

https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/

xlm40.dropper

http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/

Targets

    • Target

      cbc656e032d2736a6bbc377af94442c9c2233cbb56cd0caf029e08273993a60f

    • Size

      95KB

    • MD5

      91d721c5f5f9a1984d471ade79e181d4

    • SHA1

      9526ae2b514802582260ded72575f23675e80d96

    • SHA256

      cbc656e032d2736a6bbc377af94442c9c2233cbb56cd0caf029e08273993a60f

    • SHA512

      201ba3e3bc22660a533bb340bb810177939d1f76bb42276ff0fa2c451f3e5e895a67bca8b0da92802e048d25d76eeed7cdf1d11866019dda79f6d9885372561d

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCg+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks