General

  • Target

    a3d60499d344d47fc10e392c620ccbe51c4abd818af2424d54c079533409b258

  • Size

    53KB

  • Sample

    241120-28sytsvrbx

  • MD5

    3c3c22f26dd58cd7764113c79ea14199

  • SHA1

    3809214a67bc87d359d13bd9c6ad546f7f0ea3ba

  • SHA256

    a3d60499d344d47fc10e392c620ccbe51c4abd818af2424d54c079533409b258

  • SHA512

    167b9005626a7a53abe0ec3eca75a46d52240bf9359d35e5a0251871483ce96111c5893132641c383c90dfa1d50a4c84468e8d9663e223eb1bfb4033bc2f6a5f

  • SSDEEP

    1536:vcTKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgHpQvKf:v2Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dS

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://colordropsgu.com/7DORfidiAu/BquoSU/

xlm40.dropper

https://ewingconsulting.com/buy/Ewj7oYjhYQ/

xlm40.dropper

https://ceramicalafortaleza.com/css/5DSBCCH0/

xlm40.dropper

http://thuybaohuy.com/wp-content/VxhkYwH7/

Targets

    • Target

      a3d60499d344d47fc10e392c620ccbe51c4abd818af2424d54c079533409b258

    • Size

      53KB

    • MD5

      3c3c22f26dd58cd7764113c79ea14199

    • SHA1

      3809214a67bc87d359d13bd9c6ad546f7f0ea3ba

    • SHA256

      a3d60499d344d47fc10e392c620ccbe51c4abd818af2424d54c079533409b258

    • SHA512

      167b9005626a7a53abe0ec3eca75a46d52240bf9359d35e5a0251871483ce96111c5893132641c383c90dfa1d50a4c84468e8d9663e223eb1bfb4033bc2f6a5f

    • SSDEEP

      1536:vcTKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgHpQvKf:v2Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks