General

  • Target

    536b59c75eee338dfd505a01baf225b6c20153af6af69b6856768a416d0c85e6

  • Size

    95KB

  • Sample

    241120-2ft1esvlgx

  • MD5

    0db4600f48b82b97707929a54a359054

  • SHA1

    d86fea948e3cb7e5874d133e0a9604febc36194f

  • SHA256

    536b59c75eee338dfd505a01baf225b6c20153af6af69b6856768a416d0c85e6

  • SHA512

    3c45b1efad5ec0524ce0240e14f988a628edb5ec227cdc4585857725c7fc768bef91bae671802f1bfdad543f41a8d1b7ebfd4d799dc226ca63c114411f138c6f

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm9:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgo

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      536b59c75eee338dfd505a01baf225b6c20153af6af69b6856768a416d0c85e6

    • Size

      95KB

    • MD5

      0db4600f48b82b97707929a54a359054

    • SHA1

      d86fea948e3cb7e5874d133e0a9604febc36194f

    • SHA256

      536b59c75eee338dfd505a01baf225b6c20153af6af69b6856768a416d0c85e6

    • SHA512

      3c45b1efad5ec0524ce0240e14f988a628edb5ec227cdc4585857725c7fc768bef91bae671802f1bfdad543f41a8d1b7ebfd4d799dc226ca63c114411f138c6f

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm9:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgo

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks