General

  • Target

    480ce352affbf95d39e6b43de94bc92b3ffa87c551ce37b8560d8c23cbf072e5

  • Size

    95KB

  • Sample

    241111-w4ggcawqdn

  • MD5

    cafa2e44c11293f9aee6461a3d96c6fa

  • SHA1

    7577391397473b77866647f48cf702eb7d5cb9d4

  • SHA256

    480ce352affbf95d39e6b43de94bc92b3ffa87c551ce37b8560d8c23cbf072e5

  • SHA512

    ba5aa19c96b0d094572cf0d3fb3f532166fc3079fcc9f04f733966dc7c1858ce844740a66455f82df289b3a169a894f366057f320ab9a4132b138c20095426e8

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJm8:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      480ce352affbf95d39e6b43de94bc92b3ffa87c551ce37b8560d8c23cbf072e5

    • Size

      95KB

    • MD5

      cafa2e44c11293f9aee6461a3d96c6fa

    • SHA1

      7577391397473b77866647f48cf702eb7d5cb9d4

    • SHA256

      480ce352affbf95d39e6b43de94bc92b3ffa87c551ce37b8560d8c23cbf072e5

    • SHA512

      ba5aa19c96b0d094572cf0d3fb3f532166fc3079fcc9f04f733966dc7c1858ce844740a66455f82df289b3a169a894f366057f320ab9a4132b138c20095426e8

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJm8:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks