General

  • Target

    857762f5b49c1362a6af7f2be722a65bf5e5a5f29b01168997a2cd775139094a

  • Size

    95KB

  • Sample

    241120-2npqnswarr

  • MD5

    54033436d479a5837c9b95f0b8e5fdfc

  • SHA1

    c92a08c0255bd24ad7741d9fcfd593521f80759f

  • SHA256

    857762f5b49c1362a6af7f2be722a65bf5e5a5f29b01168997a2cd775139094a

  • SHA512

    317b38fe3bc0aa7af74b8a951883fec9a252616e4686703d745a7a4b6472ecc7fe66e260ec0c5f2c03183bc47eae743a081c34d6afca730559e30a2e98f4e34f

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmA:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      857762f5b49c1362a6af7f2be722a65bf5e5a5f29b01168997a2cd775139094a

    • Size

      95KB

    • MD5

      54033436d479a5837c9b95f0b8e5fdfc

    • SHA1

      c92a08c0255bd24ad7741d9fcfd593521f80759f

    • SHA256

      857762f5b49c1362a6af7f2be722a65bf5e5a5f29b01168997a2cd775139094a

    • SHA512

      317b38fe3bc0aa7af74b8a951883fec9a252616e4686703d745a7a4b6472ecc7fe66e260ec0c5f2c03183bc47eae743a081c34d6afca730559e30a2e98f4e34f

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmA:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks