General

  • Target

    35e8e755cd19150cd88f8f11e1a281f322703c47262b7117d2caaf2ef377d7bf

  • Size

    96KB

  • Sample

    241120-2cz29svalg

  • MD5

    ec320b0304896480f768a45cb0400e30

  • SHA1

    685db7fe4257387d968bbe224b74e20b2155e8cd

  • SHA256

    35e8e755cd19150cd88f8f11e1a281f322703c47262b7117d2caaf2ef377d7bf

  • SHA512

    a8f3ce337d5550c9b55dcb6963188b2a3167952d6c435367b6a72e0f948cc03551d3b02ac76789f7974e542756e59d14c9683e0e9b37924ef6877244375c5750

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm35:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgB

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fisika.mipa.uns.ac.id/reseller/img/nRAvAgoY8Y/

xlm40.dropper

http://greycoconut.com/edm/71qUA/

xlm40.dropper

http://zonainformatica.es/tienda/XCHJmidSYTkE/

xlm40.dropper

http://balletmagazine.ro/wp-content/9VrMPV/

Targets

    • Target

      35e8e755cd19150cd88f8f11e1a281f322703c47262b7117d2caaf2ef377d7bf

    • Size

      96KB

    • MD5

      ec320b0304896480f768a45cb0400e30

    • SHA1

      685db7fe4257387d968bbe224b74e20b2155e8cd

    • SHA256

      35e8e755cd19150cd88f8f11e1a281f322703c47262b7117d2caaf2ef377d7bf

    • SHA512

      a8f3ce337d5550c9b55dcb6963188b2a3167952d6c435367b6a72e0f948cc03551d3b02ac76789f7974e542756e59d14c9683e0e9b37924ef6877244375c5750

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm35:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgB

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks