General

  • Target

    d38759a70a6486a9c569796f3bc3691ed891d12224120f25dae835021d1d133c

  • Size

    70KB

  • Sample

    241119-ngr1kavna1

  • MD5

    4c1b619300f9381d73e30c3c31329f12

  • SHA1

    88fcf4001332a7b6545b53cf2312637c11e683e2

  • SHA256

    d38759a70a6486a9c569796f3bc3691ed891d12224120f25dae835021d1d133c

  • SHA512

    495ed96b7422ff6f848897d496668fee351c3a24ecab7c6130b2847cf650219bc9e887999d2edd111be16b446c0124e53550ef38eb4cc6b84b311d503b1735a2

  • SSDEEP

    1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+e+hDcnTLiQrRTZws8EgE:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMx

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://strachanclark.com/images/3gc4qCpSFYbBMDEC/

xlm40.dropper

https://synapse-archive.com/images/bKaMr/

xlm40.dropper

https://sumuvesa.com/wp-includes/rgL/

Targets

    • Target

      d38759a70a6486a9c569796f3bc3691ed891d12224120f25dae835021d1d133c

    • Size

      70KB

    • MD5

      4c1b619300f9381d73e30c3c31329f12

    • SHA1

      88fcf4001332a7b6545b53cf2312637c11e683e2

    • SHA256

      d38759a70a6486a9c569796f3bc3691ed891d12224120f25dae835021d1d133c

    • SHA512

      495ed96b7422ff6f848897d496668fee351c3a24ecab7c6130b2847cf650219bc9e887999d2edd111be16b446c0124e53550ef38eb4cc6b84b311d503b1735a2

    • SSDEEP

      1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+e+hDcnTLiQrRTZws8EgE:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMx

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks