General

  • Target

    7cfc38eac26801a4e203151ad00d61488da1f5eb753acf81880185cdea1ea1bb

  • Size

    110KB

  • Sample

    241119-w4rbjszcnf

  • MD5

    274f472001beb67437fd1a340aaa7be4

  • SHA1

    3c303e26508968299addb7a35720260ee7d312fd

  • SHA256

    7cfc38eac26801a4e203151ad00d61488da1f5eb753acf81880185cdea1ea1bb

  • SHA512

    bd0bcb63cb9c3c552a65a4479271d846cd361045cc451abbb514b7e48249970f0018041b15e8c6ca507537393226606b073674b6cda148d3d502f6882776a1ae

  • SSDEEP

    3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnxc:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://duvarkagitlarimodelleri.com/42hhp/gZXakh7/

xlm40.dropper

https://dolphinwavehavuzrobotu.com/wp-includes/RmCbvIKjjtlB3tabyPo/

xlm40.dropper

http://animalsandusfujairah.com/wp-admin/JWO58zeUOwSI/

Targets

    • Target

      7cfc38eac26801a4e203151ad00d61488da1f5eb753acf81880185cdea1ea1bb

    • Size

      110KB

    • MD5

      274f472001beb67437fd1a340aaa7be4

    • SHA1

      3c303e26508968299addb7a35720260ee7d312fd

    • SHA256

      7cfc38eac26801a4e203151ad00d61488da1f5eb753acf81880185cdea1ea1bb

    • SHA512

      bd0bcb63cb9c3c552a65a4479271d846cd361045cc451abbb514b7e48249970f0018041b15e8c6ca507537393226606b073674b6cda148d3d502f6882776a1ae

    • SSDEEP

      3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnxc:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks