General

  • Target

    d9a0f3a3936c606f37b16de5111ffd907ac08f1f18fcafaf684334d2eded5bba

  • Size

    95KB

  • Sample

    241120-2eppbavana

  • MD5

    edc0e66bece56b21ae9cc62cb586cf44

  • SHA1

    56951584069b3d9f2418c653d7be571b142a2d7f

  • SHA256

    d9a0f3a3936c606f37b16de5111ffd907ac08f1f18fcafaf684334d2eded5bba

  • SHA512

    473733add0f4222a50ca285330ce92ed439e73fdc5e3289a739ee4145754644044f56686d8cc6dd0750d94e9a844febd0bb6d9138fba3dec03c5e79b7faa1d04

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmZ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgM

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      d9a0f3a3936c606f37b16de5111ffd907ac08f1f18fcafaf684334d2eded5bba

    • Size

      95KB

    • MD5

      edc0e66bece56b21ae9cc62cb586cf44

    • SHA1

      56951584069b3d9f2418c653d7be571b142a2d7f

    • SHA256

      d9a0f3a3936c606f37b16de5111ffd907ac08f1f18fcafaf684334d2eded5bba

    • SHA512

      473733add0f4222a50ca285330ce92ed439e73fdc5e3289a739ee4145754644044f56686d8cc6dd0750d94e9a844febd0bb6d9138fba3dec03c5e79b7faa1d04

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmZ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks