General

  • Target

    c993916bdf6c9185eddd5af5c1560ddddd8f30e988f6068acc9d0e412c7f9406

  • Size

    95KB

  • Sample

    241120-3wsmza1jbq

  • MD5

    e6dcacf406448d613c9aee37d89b8682

  • SHA1

    ab60afdb3021230dde3467098cda72a2b761e44a

  • SHA256

    c993916bdf6c9185eddd5af5c1560ddddd8f30e988f6068acc9d0e412c7f9406

  • SHA512

    cadcfe630ef1af437b7d6162b50d165530af482ecc293b9d3a3f000e003abaf415bd4fb3d10d52cd5e83faa04c7f404a551076ebc60d5b5799bff6a52b5857db

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCs+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://francite.net/images/XI7zS0X1nY/

xlm40.dropper

https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/

xlm40.dropper

http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/

Targets

    • Target

      c993916bdf6c9185eddd5af5c1560ddddd8f30e988f6068acc9d0e412c7f9406

    • Size

      95KB

    • MD5

      e6dcacf406448d613c9aee37d89b8682

    • SHA1

      ab60afdb3021230dde3467098cda72a2b761e44a

    • SHA256

      c993916bdf6c9185eddd5af5c1560ddddd8f30e988f6068acc9d0e412c7f9406

    • SHA512

      cadcfe630ef1af437b7d6162b50d165530af482ecc293b9d3a3f000e003abaf415bd4fb3d10d52cd5e83faa04c7f404a551076ebc60d5b5799bff6a52b5857db

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCs+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks