General

  • Target

    88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697

  • Size

    96KB

  • Sample

    241119-xak34svlen

  • MD5

    140f65b78b627ea3cfd0fc7469ea3232

  • SHA1

    93f9755691cbe1848cfbf12aa835f5a9171223c6

  • SHA256

    88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697

  • SHA512

    e9f4ca6f1a33d0a1b544234e8569afb7d97ed044def84683080eee65168e2af8015a14e75931b9a3f60d08bf02a54c0243a745fdc14b4bd566c1b77b0dbf5e37

  • SSDEEP

    1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJma7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://bpsjambi.id/about/CcN5IbuInPQ/

xlm40.dropper

https://greenlizard.co.za/amanah/pu8xeUOpqqq/

xlm40.dropper

https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/

xlm40.dropper

https://www.yell.ge/nav_logo/x960wo3PHaIUm/

Targets

    • Target

      88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697

    • Size

      96KB

    • MD5

      140f65b78b627ea3cfd0fc7469ea3232

    • SHA1

      93f9755691cbe1848cfbf12aa835f5a9171223c6

    • SHA256

      88b9c4fb2391296daf82468c272abca61a13bd7eb162825066677fd9bd91f697

    • SHA512

      e9f4ca6f1a33d0a1b544234e8569afb7d97ed044def84683080eee65168e2af8015a14e75931b9a3f60d08bf02a54c0243a745fdc14b4bd566c1b77b0dbf5e37

    • SSDEEP

      1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJma7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks