General

  • Target

    05a40c08d87808bfa9711469487844da02188061349fd93203567028afdae5d7

  • Size

    243KB

  • Sample

    241111-wzhtlsslgy

  • MD5

    49f864ed29f194761e0c0eb7f3df9cb0

  • SHA1

    86fd28a34481e90b13c13fdd682e8f319dd6dbb6

  • SHA256

    05a40c08d87808bfa9711469487844da02188061349fd93203567028afdae5d7

  • SHA512

    c61d4432f3d5df887f0bca78d0985e911c6054bf73ac14be5f6042b121407c0ae01cfafb9d3e4b4fb6db15389590686b5bf7a5330a0f7c567315ba960b4f68ed

  • SSDEEP

    6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/08:ghEXs5fXR8rsNv

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://servidorcarlosydavid.es/wp-admin/jkNPgHxNjF/

xlm40.dropper

https://gmo-sol-p10.heteml.jp/includes/UoJMgYAc1EES/

xlm40.dropper

https://iashanghai.cn/z/Z1PG6ulBh20plss/

xlm40.dropper

https://www.pasionportufuturo.pe/wp-content/HkUfvw0xuCy5/

xlm40.dropper

http://dmdagents.com.au/vqwbgz/CL4Bo4C4VS0deg/

Targets

    • Target

      05a40c08d87808bfa9711469487844da02188061349fd93203567028afdae5d7

    • Size

      243KB

    • MD5

      49f864ed29f194761e0c0eb7f3df9cb0

    • SHA1

      86fd28a34481e90b13c13fdd682e8f319dd6dbb6

    • SHA256

      05a40c08d87808bfa9711469487844da02188061349fd93203567028afdae5d7

    • SHA512

      c61d4432f3d5df887f0bca78d0985e911c6054bf73ac14be5f6042b121407c0ae01cfafb9d3e4b4fb6db15389590686b5bf7a5330a0f7c567315ba960b4f68ed

    • SSDEEP

      6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/08:ghEXs5fXR8rsNv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks