General

  • Target

    bfbb520f257bccf3d8377c94844dcb36748edbb3471f26aed9f592db41e5e1d2

  • Size

    95KB

  • Sample

    241120-1ca8gatnax

  • MD5

    525332767f3e75f895e4351a9a3e4719

  • SHA1

    7b6a029fcc91c9d6268086502a42ce9649a94f53

  • SHA256

    bfbb520f257bccf3d8377c94844dcb36748edbb3471f26aed9f592db41e5e1d2

  • SHA512

    66b071526debfdea0518babc54e711e2821958d82f52dbce02c8f575a532721bd7d1201533f6ebfe4af71756c9d3b9772443c218b2ad2aa2ce11912599dde5f0

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJms:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      bfbb520f257bccf3d8377c94844dcb36748edbb3471f26aed9f592db41e5e1d2

    • Size

      95KB

    • MD5

      525332767f3e75f895e4351a9a3e4719

    • SHA1

      7b6a029fcc91c9d6268086502a42ce9649a94f53

    • SHA256

      bfbb520f257bccf3d8377c94844dcb36748edbb3471f26aed9f592db41e5e1d2

    • SHA512

      66b071526debfdea0518babc54e711e2821958d82f52dbce02c8f575a532721bd7d1201533f6ebfe4af71756c9d3b9772443c218b2ad2aa2ce11912599dde5f0

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJms:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks