General

  • Target

    3dcf128678fc790168be4009699ba48a3dec04d811db15b82e796f343f6e5fc5

  • Size

    95KB

  • Sample

    241120-1ywfjaypek

  • MD5

    86aad18fb24ff4ceb852b2245ab406f1

  • SHA1

    024bb509e47995593c973b90e8836c3653cd6d16

  • SHA256

    3dcf128678fc790168be4009699ba48a3dec04d811db15b82e796f343f6e5fc5

  • SHA512

    671b6020a0c70e033744ac2be7eb176a77af80c723cab844e0ef52c618ec31a7a2c66df6a89b608320a7955a7b04028d32d1fbc67cb3dceab7dfbafec48cb58d

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmA:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgO

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      3dcf128678fc790168be4009699ba48a3dec04d811db15b82e796f343f6e5fc5

    • Size

      95KB

    • MD5

      86aad18fb24ff4ceb852b2245ab406f1

    • SHA1

      024bb509e47995593c973b90e8836c3653cd6d16

    • SHA256

      3dcf128678fc790168be4009699ba48a3dec04d811db15b82e796f343f6e5fc5

    • SHA512

      671b6020a0c70e033744ac2be7eb176a77af80c723cab844e0ef52c618ec31a7a2c66df6a89b608320a7955a7b04028d32d1fbc67cb3dceab7dfbafec48cb58d

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmA:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgO

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks