General

  • Target

    90021721d8da5d027c3fef3d271019875683bf3735dd7f7f0c5a5810b30c1a74

  • Size

    76KB

  • Sample

    241120-3n9lhswkfv

  • MD5

    3971110a7ad82c942642b1d09963df28

  • SHA1

    7e2b71a1a4fa5af5177677bd56277288a01374d8

  • SHA256

    90021721d8da5d027c3fef3d271019875683bf3735dd7f7f0c5a5810b30c1a74

  • SHA512

    87c2fb599afb281c5e51e8c0a10d4a197ee9fc1ec6bbb4c0433d83f7907c5d7813be4ab0f66ad06964cbb68f0add7e6b34c75a7119b57d9015c04c2939c9a25a

  • SSDEEP

    1536:GSKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYI+hD8nTLqQrRrZws8EKXifC:FKpb8rGYrMPe3q7Q0XV5xtezEsi8/dge

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://newkano.com/wp-admin/66rIsrVwoPKUsjcAs/

xlm40.dropper

http://ocalogullari.com/inc/Wcm82enrs8/

xlm40.dropper

https://myphamcuatui.com/assets/OPVeVSpO/

Targets

    • Target

      90021721d8da5d027c3fef3d271019875683bf3735dd7f7f0c5a5810b30c1a74

    • Size

      76KB

    • MD5

      3971110a7ad82c942642b1d09963df28

    • SHA1

      7e2b71a1a4fa5af5177677bd56277288a01374d8

    • SHA256

      90021721d8da5d027c3fef3d271019875683bf3735dd7f7f0c5a5810b30c1a74

    • SHA512

      87c2fb599afb281c5e51e8c0a10d4a197ee9fc1ec6bbb4c0433d83f7907c5d7813be4ab0f66ad06964cbb68f0add7e6b34c75a7119b57d9015c04c2939c9a25a

    • SSDEEP

      1536:GSKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYI+hD8nTLqQrRrZws8EKXifC:FKpb8rGYrMPe3q7Q0XV5xtezEsi8/dge

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks