General

  • Target

    024b9cd3ce2395138f09777bd0db66a92cf8632583c3818655f9d45dc43f382a

  • Size

    46KB

  • Sample

    241120-2gqz6avbjc

  • MD5

    c7151c8fe7501fa9beae28d72706725e

  • SHA1

    9f95690e4a9700f729f68cb973880bc7af94f864

  • SHA256

    024b9cd3ce2395138f09777bd0db66a92cf8632583c3818655f9d45dc43f382a

  • SHA512

    d089373b450113e176234e7c7ebc3613dd04a08be38fa7ef31faa80e5e0695e9483595cee8c7449155e5ebe681e6d3facfa0cfd1771feeb3903051a6df8c846e

  • SSDEEP

    768:pDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VgTBs7QqvZQ4tsdurr:pYKpb8rGYrMPe3q7Q0XV5xtezE8vG8Ur

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://202.29.80.55/2021/z/

xlm40.dropper

http://23.239.12.243/dealspot/SvebxVmFucz/

xlm40.dropper

https://adviceme.gr/test/SSzbOkk633/

Targets

    • Target

      024b9cd3ce2395138f09777bd0db66a92cf8632583c3818655f9d45dc43f382a

    • Size

      46KB

    • MD5

      c7151c8fe7501fa9beae28d72706725e

    • SHA1

      9f95690e4a9700f729f68cb973880bc7af94f864

    • SHA256

      024b9cd3ce2395138f09777bd0db66a92cf8632583c3818655f9d45dc43f382a

    • SHA512

      d089373b450113e176234e7c7ebc3613dd04a08be38fa7ef31faa80e5e0695e9483595cee8c7449155e5ebe681e6d3facfa0cfd1771feeb3903051a6df8c846e

    • SSDEEP

      768:pDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VgTBs7QqvZQ4tsdurr:pYKpb8rGYrMPe3q7Q0XV5xtezE8vG8Ur

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks