General

  • Target

    0b070bad0bd2b0f4d7846c6cda84171d341f586a12edd8f58eed6a55d5e4dc06

  • Size

    56KB

  • Sample

    241120-2w6n6awcmp

  • MD5

    8c34ead262ea23890ca5f6f7f9840242

  • SHA1

    d3b89255707f80d790773a0e548091df7baa338d

  • SHA256

    0b070bad0bd2b0f4d7846c6cda84171d341f586a12edd8f58eed6a55d5e4dc06

  • SHA512

    f6bb34dabcc1dfab1578281f6005d9c1374c423d9ba3c434225eb74e6a3c059ab0b4a482a24fa0b35caf61873e81efe8b1345afc7943c45321e9ced12990d7b6

  • SSDEEP

    1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg/5G9XSZ4umvj:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgo

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://church.ktc-center.net/PbSkdCOW/

xlm40.dropper

https://chobemaster.com/components/gus/

xlm40.dropper

https://christianchapman.com/cgi-bin/gADHL9UXSFUTN/

Targets

    • Target

      0b070bad0bd2b0f4d7846c6cda84171d341f586a12edd8f58eed6a55d5e4dc06

    • Size

      56KB

    • MD5

      8c34ead262ea23890ca5f6f7f9840242

    • SHA1

      d3b89255707f80d790773a0e548091df7baa338d

    • SHA256

      0b070bad0bd2b0f4d7846c6cda84171d341f586a12edd8f58eed6a55d5e4dc06

    • SHA512

      f6bb34dabcc1dfab1578281f6005d9c1374c423d9ba3c434225eb74e6a3c059ab0b4a482a24fa0b35caf61873e81efe8b1345afc7943c45321e9ced12990d7b6

    • SSDEEP

      1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg/5G9XSZ4umvj:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgo

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks