General

  • Target

    eb66f4cb0e579f6db90b131db44a24c84282bc9e5a58dd78d46daf7febe753dd

  • Size

    70KB

  • Sample

    241119-w2r53azhkl

  • MD5

    db70620c3edb4ff8e4da652abc5cb9b1

  • SHA1

    5d0e9f83476dde55f38df529a03ae6e4bc5b1655

  • SHA256

    eb66f4cb0e579f6db90b131db44a24c84282bc9e5a58dd78d46daf7febe753dd

  • SHA512

    ccaa94ff30127b77f344a13afa5d3bbac241597d3cd84fc15c8a6412dd665e7083d5125d08459a14540cde22d2da2354953921e7fcac827085fb6936227bfcfd

  • SSDEEP

    1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+KJ+hDcnTLiQrRTZws8Eo:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://sacvasanth.com/public/lyP2lh1hlJr/

xlm40.dropper

https://webguruindia.com/theme/wTbEyLVvMNB3j/

xlm40.dropper

http://stockmorehouse.com/Casa_Grande/AS4VPkTsOqWDGGO/

Targets

    • Target

      eb66f4cb0e579f6db90b131db44a24c84282bc9e5a58dd78d46daf7febe753dd

    • Size

      70KB

    • MD5

      db70620c3edb4ff8e4da652abc5cb9b1

    • SHA1

      5d0e9f83476dde55f38df529a03ae6e4bc5b1655

    • SHA256

      eb66f4cb0e579f6db90b131db44a24c84282bc9e5a58dd78d46daf7febe753dd

    • SHA512

      ccaa94ff30127b77f344a13afa5d3bbac241597d3cd84fc15c8a6412dd665e7083d5125d08459a14540cde22d2da2354953921e7fcac827085fb6936227bfcfd

    • SSDEEP

      1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+KJ+hDcnTLiQrRTZws8Eo:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks