General

  • Target

    7389895af3e4b050b96bcde9923efb769ce74db466cf2f8585ee98e9c94afeb6

  • Size

    243KB

  • Sample

    241120-1dhnyavblk

  • MD5

    82bfc5e5228e6db96cc9ffcc7fa98e3a

  • SHA1

    9f64c99166f453c6c4c04685a5a8692b23e299c2

  • SHA256

    7389895af3e4b050b96bcde9923efb769ce74db466cf2f8585ee98e9c94afeb6

  • SHA512

    c8bce3d2b3dc469128938df367813fcc9e31206752ebf8a84580aa08cef6903cb1031549841198b8bb062e8087b9c862ceb305c8c8c64d9306928fdb263c7ced

  • SSDEEP

    6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/0s:ghEXs5fXR8rsN/

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://servidorcarlosydavid.es/wp-admin/jkNPgHxNjF/

xlm40.dropper

https://gmo-sol-p10.heteml.jp/includes/UoJMgYAc1EES/

xlm40.dropper

https://iashanghai.cn/z/Z1PG6ulBh20plss/

xlm40.dropper

https://www.pasionportufuturo.pe/wp-content/HkUfvw0xuCy5/

xlm40.dropper

http://dmdagents.com.au/vqwbgz/CL4Bo4C4VS0deg/

Targets

    • Target

      7389895af3e4b050b96bcde9923efb769ce74db466cf2f8585ee98e9c94afeb6

    • Size

      243KB

    • MD5

      82bfc5e5228e6db96cc9ffcc7fa98e3a

    • SHA1

      9f64c99166f453c6c4c04685a5a8692b23e299c2

    • SHA256

      7389895af3e4b050b96bcde9923efb769ce74db466cf2f8585ee98e9c94afeb6

    • SHA512

      c8bce3d2b3dc469128938df367813fcc9e31206752ebf8a84580aa08cef6903cb1031549841198b8bb062e8087b9c862ceb305c8c8c64d9306928fdb263c7ced

    • SSDEEP

      6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/0s:ghEXs5fXR8rsN/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks