General

  • Target

    ec7c43dfc31558b146e5e627ecd30bf0e7571be9bb784729c225e9886cdb7155

  • Size

    96KB

  • Sample

    241120-3hlmhavhmb

  • MD5

    d4d8bc0c57284c348203e48313e8ed5a

  • SHA1

    8a85906ad93e66db28ec46c6d9181785332bbe03

  • SHA256

    ec7c43dfc31558b146e5e627ecd30bf0e7571be9bb784729c225e9886cdb7155

  • SHA512

    e02b7818d51d53677e87790e143788b18c52699b2807131cbfcad275fa26ba4a120ac9aa82c532852b649a5d25639cf909c80e0fa1cfcb2ef3a03ff8116b4fa2

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2HuS4hcTO97v7UYdEJmU:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgw

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://atperson.com/campusvirtual/EOgFGo17w/

xlm40.dropper

https://eliteturismo.com/phpmailer-old/dafdBxQONtk5Uf9dxll/

xlm40.dropper

http://atici.net/c/JDFDBMIz/

xlm40.dropper

http://domesticuif.co.za/libraries/nbnH9dpd/

Targets

    • Target

      ec7c43dfc31558b146e5e627ecd30bf0e7571be9bb784729c225e9886cdb7155

    • Size

      96KB

    • MD5

      d4d8bc0c57284c348203e48313e8ed5a

    • SHA1

      8a85906ad93e66db28ec46c6d9181785332bbe03

    • SHA256

      ec7c43dfc31558b146e5e627ecd30bf0e7571be9bb784729c225e9886cdb7155

    • SHA512

      e02b7818d51d53677e87790e143788b18c52699b2807131cbfcad275fa26ba4a120ac9aa82c532852b649a5d25639cf909c80e0fa1cfcb2ef3a03ff8116b4fa2

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2HuS4hcTO97v7UYdEJmU:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks