General

  • Target

    af15fbbb18a9460e9044c77b8cea2fc5f45f68320ab69a3556f8ff27a63cb33e

  • Size

    96KB

  • Sample

    241119-xm9x1a1crq

  • MD5

    67dba099769c20862372929ea972796e

  • SHA1

    45194fc37ab5cefc0baae318c2f4eba53215192b

  • SHA256

    af15fbbb18a9460e9044c77b8cea2fc5f45f68320ab69a3556f8ff27a63cb33e

  • SHA512

    27d9916bf08efeda2a15be66462daf1cfa86cfb16ec137cf32f077a0a7d00acf6c8fd26b12634ad184972da7eb61a3cd1d8ea9cf12dae49dea985cc5e949353f

  • SSDEEP

    1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmK7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://bpsjambi.id/about/CcN5IbuInPQ/

xlm40.dropper

https://greenlizard.co.za/amanah/pu8xeUOpqqq/

xlm40.dropper

https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/

xlm40.dropper

https://www.yell.ge/nav_logo/x960wo3PHaIUm/

Targets

    • Target

      af15fbbb18a9460e9044c77b8cea2fc5f45f68320ab69a3556f8ff27a63cb33e

    • Size

      96KB

    • MD5

      67dba099769c20862372929ea972796e

    • SHA1

      45194fc37ab5cefc0baae318c2f4eba53215192b

    • SHA256

      af15fbbb18a9460e9044c77b8cea2fc5f45f68320ab69a3556f8ff27a63cb33e

    • SHA512

      27d9916bf08efeda2a15be66462daf1cfa86cfb16ec137cf32f077a0a7d00acf6c8fd26b12634ad184972da7eb61a3cd1d8ea9cf12dae49dea985cc5e949353f

    • SSDEEP

      1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmK7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks