General

  • Target

    de837c2f5df7313d8d64e0d83bdb87081de96b24a22c38894d70d359db019427

  • Size

    70KB

  • Sample

    241120-1192psvfkp

  • MD5

    aea87205bedf34dc9f903db0a710e6d0

  • SHA1

    5d3e80e6bc99a741c4b90e58523953c66d4b79f4

  • SHA256

    de837c2f5df7313d8d64e0d83bdb87081de96b24a22c38894d70d359db019427

  • SHA512

    9bf897743431898137501f379375fb7609f4cdb600cbaf50e5cbfa9375a3ca71dbe329ffbf2b75e234dc86080b21c92fcf0c20a99322b4578993a7135efde88e

  • SSDEEP

    1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+KJ+hDcnTLiQrRTZws8Eo:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://sacvasanth.com/public/lyP2lh1hlJr/

xlm40.dropper

https://webguruindia.com/theme/wTbEyLVvMNB3j/

xlm40.dropper

http://stockmorehouse.com/Casa_Grande/AS4VPkTsOqWDGGO/

Targets

    • Target

      de837c2f5df7313d8d64e0d83bdb87081de96b24a22c38894d70d359db019427

    • Size

      70KB

    • MD5

      aea87205bedf34dc9f903db0a710e6d0

    • SHA1

      5d3e80e6bc99a741c4b90e58523953c66d4b79f4

    • SHA256

      de837c2f5df7313d8d64e0d83bdb87081de96b24a22c38894d70d359db019427

    • SHA512

      9bf897743431898137501f379375fb7609f4cdb600cbaf50e5cbfa9375a3ca71dbe329ffbf2b75e234dc86080b21c92fcf0c20a99322b4578993a7135efde88e

    • SSDEEP

      1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+KJ+hDcnTLiQrRTZws8Eo:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks