General

  • Target

    dd35210c6516d48969119e2a488d87a0a99264d9c864d22c29fcdc2d1fc22fee

  • Size

    95KB

  • Sample

    241119-nbspxawbqr

  • MD5

    e04fe5f27ef8ff0594c3f5db1b4902b6

  • SHA1

    9d056fd7984713bd037de5e4cf9af4fd448f8db6

  • SHA256

    dd35210c6516d48969119e2a488d87a0a99264d9c864d22c29fcdc2d1fc22fee

  • SHA512

    1eb0ebe9bd7b7eaf20e909a009902175a15c51cc15fbbb7780cdd8aca1671b78eb0e5b0d5e38cef08e7bd412f512e4a22b140d53028acfcbabc2eb7d28700c86

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgaHuS4hcTO97v7UYdEJm4:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgo

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://bpsjambi.id/about/5dDtahY1ewj/

xlm40.dropper

http://alsafwa.com.ly/webcal/E3Yx9UarfMuz6sk/

xlm40.dropper

http://galileuconcursos.com.br/wp-admin/iF9x/

xlm40.dropper

https://frascona.com.ar/assets/xobbA5VJIi/

Targets

    • Target

      dd35210c6516d48969119e2a488d87a0a99264d9c864d22c29fcdc2d1fc22fee

    • Size

      95KB

    • MD5

      e04fe5f27ef8ff0594c3f5db1b4902b6

    • SHA1

      9d056fd7984713bd037de5e4cf9af4fd448f8db6

    • SHA256

      dd35210c6516d48969119e2a488d87a0a99264d9c864d22c29fcdc2d1fc22fee

    • SHA512

      1eb0ebe9bd7b7eaf20e909a009902175a15c51cc15fbbb7780cdd8aca1671b78eb0e5b0d5e38cef08e7bd412f512e4a22b140d53028acfcbabc2eb7d28700c86

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgaHuS4hcTO97v7UYdEJm4:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgo

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks