General

  • Target

    f814d4ee1c82ba7fc85bb7f3289a7de74538bae2c81f58cafe6384f7692ebc5e

  • Size

    70KB

  • Sample

    241120-3hr5aazqcl

  • MD5

    bd30203cefaf268be8ed83e10ad40179

  • SHA1

    4d351977148bfc1e1e441118ca5994ca18e96212

  • SHA256

    f814d4ee1c82ba7fc85bb7f3289a7de74538bae2c81f58cafe6384f7692ebc5e

  • SHA512

    c54051a29016d6af54abb1e322f1a0358cdf51a47190e2f35411ba379b03acfb8ba787c6507544a28875702553be2cf0e43d0c92839ae3ef0de1d30dde39e2ff

  • SSDEEP

    1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+e+hDcnTLiQrRTZws8Egk:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMx

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://strachanclark.com/images/3gc4qCpSFYbBMDEC/

xlm40.dropper

https://synapse-archive.com/images/bKaMr/

xlm40.dropper

https://sumuvesa.com/wp-includes/rgL/

Targets

    • Target

      f814d4ee1c82ba7fc85bb7f3289a7de74538bae2c81f58cafe6384f7692ebc5e

    • Size

      70KB

    • MD5

      bd30203cefaf268be8ed83e10ad40179

    • SHA1

      4d351977148bfc1e1e441118ca5994ca18e96212

    • SHA256

      f814d4ee1c82ba7fc85bb7f3289a7de74538bae2c81f58cafe6384f7692ebc5e

    • SHA512

      c54051a29016d6af54abb1e322f1a0358cdf51a47190e2f35411ba379b03acfb8ba787c6507544a28875702553be2cf0e43d0c92839ae3ef0de1d30dde39e2ff

    • SSDEEP

      1536:OhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+e+hDcnTLiQrRTZws8Egk:uKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMx

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks