General

  • Target

    67aa48b847622a7219baa7cf3c066a40e3519b1d00e73bbe94511295d90fc5da

  • Size

    96KB

  • Sample

    241119-xca1xsvmal

  • MD5

    362eedf51bcb7203399b2ef19efcafc1

  • SHA1

    5cfb2dfd96a583c9f853171120d493a5ef4c83aa

  • SHA256

    67aa48b847622a7219baa7cf3c066a40e3519b1d00e73bbe94511295d90fc5da

  • SHA512

    b9be67f6933bd42c65217f36db6804119dac18a926d8404e6ba0565766243c0d10c1c4498b07dd301f05080331a41d99b11053b2420df8e00bb9549406ac0dcc

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2HuS4hcTO97v7UYdEJmw:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgc

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://atperson.com/campusvirtual/EOgFGo17w/

xlm40.dropper

https://eliteturismo.com/phpmailer-old/dafdBxQONtk5Uf9dxll/

xlm40.dropper

http://atici.net/c/JDFDBMIz/

xlm40.dropper

http://domesticuif.co.za/libraries/nbnH9dpd/

Targets

    • Target

      67aa48b847622a7219baa7cf3c066a40e3519b1d00e73bbe94511295d90fc5da

    • Size

      96KB

    • MD5

      362eedf51bcb7203399b2ef19efcafc1

    • SHA1

      5cfb2dfd96a583c9f853171120d493a5ef4c83aa

    • SHA256

      67aa48b847622a7219baa7cf3c066a40e3519b1d00e73bbe94511295d90fc5da

    • SHA512

      b9be67f6933bd42c65217f36db6804119dac18a926d8404e6ba0565766243c0d10c1c4498b07dd301f05080331a41d99b11053b2420df8e00bb9549406ac0dcc

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2HuS4hcTO97v7UYdEJmw:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks