General

  • Target

    d68c7c66310be9d250d2719443a92711d6f1eb6b17f3d56864b86c631b6bc31d

  • Size

    96KB

  • Sample

    241120-d4h13azlet

  • MD5

    5f0b39d540648b2feacd0ffc33d1d494

  • SHA1

    e6cd65629fb9d60c91f55b121f41e08cd8d9b349

  • SHA256

    d68c7c66310be9d250d2719443a92711d6f1eb6b17f3d56864b86c631b6bc31d

  • SHA512

    c926c5b8646366f76a0512b8279bf6b2709a220a6ebb00c4f3aa22f0cfebbdb41b39977d8788b98c82da67a91392695c0719987b501eab9e572a18396ffd4426

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2HuS4hcTO97v7UYdEJmE:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgg

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://atperson.com/campusvirtual/EOgFGo17w/

xlm40.dropper

https://eliteturismo.com/phpmailer-old/dafdBxQONtk5Uf9dxll/

xlm40.dropper

http://atici.net/c/JDFDBMIz/

xlm40.dropper

http://domesticuif.co.za/libraries/nbnH9dpd/

Targets

    • Target

      d68c7c66310be9d250d2719443a92711d6f1eb6b17f3d56864b86c631b6bc31d

    • Size

      96KB

    • MD5

      5f0b39d540648b2feacd0ffc33d1d494

    • SHA1

      e6cd65629fb9d60c91f55b121f41e08cd8d9b349

    • SHA256

      d68c7c66310be9d250d2719443a92711d6f1eb6b17f3d56864b86c631b6bc31d

    • SHA512

      c926c5b8646366f76a0512b8279bf6b2709a220a6ebb00c4f3aa22f0cfebbdb41b39977d8788b98c82da67a91392695c0719987b501eab9e572a18396ffd4426

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2HuS4hcTO97v7UYdEJmE:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgg

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks