General

  • Target

    7cb93292cccff46d82dcebd9b36456cf14dcd9195ed661a8e74614ad2f886ad0

  • Size

    40KB

  • Sample

    241119-w8qktavlcj

  • MD5

    61423686fd4296a1267ae55e88a51e90

  • SHA1

    21b5e1ab2f773723207e3a7ac594e9e88bb87eaf

  • SHA256

    7cb93292cccff46d82dcebd9b36456cf14dcd9195ed661a8e74614ad2f886ad0

  • SHA512

    30a54110b706454bebd95598cd975b1f17c159023e65dfa93d79852160ee02f57f5a5f11640117896f9b2ae5bfb58302ccfa1d196c986c66e6e603a454c7b484

  • SSDEEP

    768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1ls:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://easiercommunications.com/wp-content/w/

xlm40.dropper

http://dulichdichvu.net/libraries/QhtrjCZymLp5EbqOdpKk/

xlm40.dropper

https://www.whow.fr/wp-includes/H54Fgj0tG/

xlm40.dropper

http://genccagdas.com.tr/assets/TTHOm833iNn3BxT/

xlm40.dropper

http://heaventechnologies.com.pk/apitest/xdeAU0rx26LT9I/

xlm40.dropper

http://goonboy.com/goonie/bSFz7Av/

Targets

    • Target

      7cb93292cccff46d82dcebd9b36456cf14dcd9195ed661a8e74614ad2f886ad0

    • Size

      40KB

    • MD5

      61423686fd4296a1267ae55e88a51e90

    • SHA1

      21b5e1ab2f773723207e3a7ac594e9e88bb87eaf

    • SHA256

      7cb93292cccff46d82dcebd9b36456cf14dcd9195ed661a8e74614ad2f886ad0

    • SHA512

      30a54110b706454bebd95598cd975b1f17c159023e65dfa93d79852160ee02f57f5a5f11640117896f9b2ae5bfb58302ccfa1d196c986c66e6e603a454c7b484

    • SSDEEP

      768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1ls:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks