General

  • Target

    7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49

  • Size

    95KB

  • Sample

    241119-xhwvkszmbs

  • MD5

    2d3b1a5dad99e32f133e13f260519b6a

  • SHA1

    3f488f1f85d6daa8d4376a8c232b9efc209a1c41

  • SHA256

    7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49

  • SHA512

    40b022c41cf0c2b57182134fb02a2e5d25858b0cc89d4b5919f05f229758e174796f81b934ebb79dd7564830f6b173d0805633902e29fd007e10a5d557e7583e

  • SSDEEP

    1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgCHuS4hcTO97v7UYdEJmor:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49

    • Size

      95KB

    • MD5

      2d3b1a5dad99e32f133e13f260519b6a

    • SHA1

      3f488f1f85d6daa8d4376a8c232b9efc209a1c41

    • SHA256

      7bb679fd3535464237922aac06d99bcd687e4a1c4ccc825e0986981e0eed7c49

    • SHA512

      40b022c41cf0c2b57182134fb02a2e5d25858b0cc89d4b5919f05f229758e174796f81b934ebb79dd7564830f6b173d0805633902e29fd007e10a5d557e7583e

    • SSDEEP

      1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgCHuS4hcTO97v7UYdEJmor:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks