General

  • Target

    917873dbfa98994bd5d9fe04264d74d81382b51c8f0a246804c05d89c17d1178

  • Size

    96KB

  • Sample

    241120-c98cgaynes

  • MD5

    2f25d734c0b4273f91dacbe7a2cd8aaf

  • SHA1

    ef19409452de3289c605a4518e8d9a5e792f89f0

  • SHA256

    917873dbfa98994bd5d9fe04264d74d81382b51c8f0a246804c05d89c17d1178

  • SHA512

    ecc473ebee3617100b7d0e51be1e7836c6bc6a9d5cb0180cd9e5b0c9fc9decbd608a51836c8b17e7213407d82531bce1f1a8f7893d92122bf99d349841aa7045

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3J:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgR

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fisika.mipa.uns.ac.id/reseller/img/nRAvAgoY8Y/

xlm40.dropper

http://greycoconut.com/edm/71qUA/

xlm40.dropper

http://zonainformatica.es/tienda/XCHJmidSYTkE/

xlm40.dropper

http://balletmagazine.ro/wp-content/9VrMPV/

Targets

    • Target

      917873dbfa98994bd5d9fe04264d74d81382b51c8f0a246804c05d89c17d1178

    • Size

      96KB

    • MD5

      2f25d734c0b4273f91dacbe7a2cd8aaf

    • SHA1

      ef19409452de3289c605a4518e8d9a5e792f89f0

    • SHA256

      917873dbfa98994bd5d9fe04264d74d81382b51c8f0a246804c05d89c17d1178

    • SHA512

      ecc473ebee3617100b7d0e51be1e7836c6bc6a9d5cb0180cd9e5b0c9fc9decbd608a51836c8b17e7213407d82531bce1f1a8f7893d92122bf99d349841aa7045

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3J:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks