General

  • Target

    97c83302a8e6cf45c425139b6711d08af5878928c130bea8c28dc951a021c382

  • Size

    74KB

  • Sample

    241120-3d63mszpfj

  • MD5

    63aaa783bd7e9422654036acb1799212

  • SHA1

    b81c8eceba2c4c0d5782756fa86a3a7e786aa877

  • SHA256

    97c83302a8e6cf45c425139b6711d08af5878928c130bea8c28dc951a021c382

  • SHA512

    9ed5786ed8da9b872fd789d15315947b8532cefdd7db5092b821b45652623742ad93e332c73d8961354f0b2e259d4ac407b1f0deaab52b471240f5ebe3ee155d

  • SSDEEP

    1536:VTOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTKHuS4NcTO9/z7UYdEJBo:VaKpb8rGYrMPe3q7Q0XV5xtezEsi8/dw

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bdtin.com/cache/4G8pl/

xlm40.dropper

http://bascoysonido.com.ar/cgi-bin/AmUUPhWK6oTKLzHpl7zm/

xlm40.dropper

http://basnetbd.com/ckfinder/K0a/

Targets

    • Target

      97c83302a8e6cf45c425139b6711d08af5878928c130bea8c28dc951a021c382

    • Size

      74KB

    • MD5

      63aaa783bd7e9422654036acb1799212

    • SHA1

      b81c8eceba2c4c0d5782756fa86a3a7e786aa877

    • SHA256

      97c83302a8e6cf45c425139b6711d08af5878928c130bea8c28dc951a021c382

    • SHA512

      9ed5786ed8da9b872fd789d15315947b8532cefdd7db5092b821b45652623742ad93e332c73d8961354f0b2e259d4ac407b1f0deaab52b471240f5ebe3ee155d

    • SSDEEP

      1536:VTOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTKHuS4NcTO9/z7UYdEJBo:VaKpb8rGYrMPe3q7Q0XV5xtezEsi8/dw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks