General

  • Target

    d5c4faa3795761dd8cc90506c331ca3feb5307e10db5672699e0539e197c7f94

  • Size

    40KB

  • Sample

    241120-3ft6vswjdy

  • MD5

    416481282897322bb453345fbef4e348

  • SHA1

    345ca98b5291ffdcb7b3cc2317fbb0880f4c3ff6

  • SHA256

    d5c4faa3795761dd8cc90506c331ca3feb5307e10db5672699e0539e197c7f94

  • SHA512

    19ac988cf177a90791d7ecc675cdf996d673e152399c02d956d0d4c5a2f42d049535ea4236b04ceaead5527c93b6d3d860fe5c7383d1ee7bd94df936037d77de

  • SSDEEP

    768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1lQ:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d4

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://easiercommunications.com/wp-content/w/

xlm40.dropper

http://dulichdichvu.net/libraries/QhtrjCZymLp5EbqOdpKk/

xlm40.dropper

https://www.whow.fr/wp-includes/H54Fgj0tG/

xlm40.dropper

http://genccagdas.com.tr/assets/TTHOm833iNn3BxT/

xlm40.dropper

http://heaventechnologies.com.pk/apitest/xdeAU0rx26LT9I/

xlm40.dropper

http://goonboy.com/goonie/bSFz7Av/

Targets

    • Target

      d5c4faa3795761dd8cc90506c331ca3feb5307e10db5672699e0539e197c7f94

    • Size

      40KB

    • MD5

      416481282897322bb453345fbef4e348

    • SHA1

      345ca98b5291ffdcb7b3cc2317fbb0880f4c3ff6

    • SHA256

      d5c4faa3795761dd8cc90506c331ca3feb5307e10db5672699e0539e197c7f94

    • SHA512

      19ac988cf177a90791d7ecc675cdf996d673e152399c02d956d0d4c5a2f42d049535ea4236b04ceaead5527c93b6d3d860fe5c7383d1ee7bd94df936037d77de

    • SSDEEP

      768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1lQ:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks