General

  • Target

    9003966df2a166b405ab0c857a64434e15b4a172634d19d52841637710caebed

  • Size

    248KB

  • Sample

    241120-3e642awfpq

  • MD5

    38b5bc3947056da0390a904c03b1d6ac

  • SHA1

    fec5c52695f9287bf670cdfbfa1eb7a21d6be665

  • SHA256

    9003966df2a166b405ab0c857a64434e15b4a172634d19d52841637710caebed

  • SHA512

    f2259dd52504c81d8c7fb88b96182dba22099d884bcf4398e33174e9e12cec4e510811ae710219d0a1d29b4250537a886990f4d582fda3dbacf7cd599b5bba1f

  • SSDEEP

    6144:EKpbdrHYrMue8q7QPX+5xtFEdi8/dgUThvsiKIjvl5fd1Xh8rsoX/w/0t:UhEXs5fXR8rsNg

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://dalgahavuzu.com/pwkfky/LF0WU/

xlm40.dropper

https://dolphinsupremehavuzrobotu.com/yrrct/QcbxhqCQ/

xlm40.dropper

https://sandiegoinsuranceagents.com/cgi-bin/XK1VSXZddLdN/

Targets

    • Target

      9003966df2a166b405ab0c857a64434e15b4a172634d19d52841637710caebed

    • Size

      248KB

    • MD5

      38b5bc3947056da0390a904c03b1d6ac

    • SHA1

      fec5c52695f9287bf670cdfbfa1eb7a21d6be665

    • SHA256

      9003966df2a166b405ab0c857a64434e15b4a172634d19d52841637710caebed

    • SHA512

      f2259dd52504c81d8c7fb88b96182dba22099d884bcf4398e33174e9e12cec4e510811ae710219d0a1d29b4250537a886990f4d582fda3dbacf7cd599b5bba1f

    • SSDEEP

      6144:EKpbdrHYrMue8q7QPX+5xtFEdi8/dgUThvsiKIjvl5fd1Xh8rsoX/w/0t:UhEXs5fXR8rsNg

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks