General

  • Target

    628d7460f89accaf8732962f48ff7e10bb4ffd8080fa93927d1cb75fb3c5f2f2

  • Size

    70KB

  • Sample

    241120-23e5saveqa

  • MD5

    443dcb6447f86a38889df60651d67fb4

  • SHA1

    36b7c6ea9ebe68a65815e96600b07710d4555aa3

  • SHA256

    628d7460f89accaf8732962f48ff7e10bb4ffd8080fa93927d1cb75fb3c5f2f2

  • SHA512

    feeddc83c475ac57d2b27921e2cbfe3d0e49c1dd27e267caaf31cc9fb60f7351b69ebb98c75262bc330ca62e1c02e8f600eaa4389cde62142872c69abd8c0c87

  • SSDEEP

    1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+e+hDcnTLiQrRTZws8Egk:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMx

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://strachanclark.com/images/3gc4qCpSFYbBMDEC/

xlm40.dropper

https://synapse-archive.com/images/bKaMr/

xlm40.dropper

https://sumuvesa.com/wp-includes/rgL/

Targets

    • Target

      628d7460f89accaf8732962f48ff7e10bb4ffd8080fa93927d1cb75fb3c5f2f2

    • Size

      70KB

    • MD5

      443dcb6447f86a38889df60651d67fb4

    • SHA1

      36b7c6ea9ebe68a65815e96600b07710d4555aa3

    • SHA256

      628d7460f89accaf8732962f48ff7e10bb4ffd8080fa93927d1cb75fb3c5f2f2

    • SHA512

      feeddc83c475ac57d2b27921e2cbfe3d0e49c1dd27e267caaf31cc9fb60f7351b69ebb98c75262bc330ca62e1c02e8f600eaa4389cde62142872c69abd8c0c87

    • SSDEEP

      1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+e+hDcnTLiQrRTZws8Egk:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMx

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks