General

  • Target

    47622bbacb3d00e277667b260e25d6962e7380cbb3e0da10c68c9307b33cc56e

  • Size

    95KB

  • Sample

    241120-datwgayemb

  • MD5

    ae4ad0d2635c7458d35e331e357ba578

  • SHA1

    2c330936247a18578ea6cfaac1d10a9ac132d93d

  • SHA256

    47622bbacb3d00e277667b260e25d6962e7380cbb3e0da10c68c9307b33cc56e

  • SHA512

    a47d5fb76888c45198af6247ca7de7ca01ddf6f1113b65c846ca296830f2368ee81a2a5556be7d5bf4f41f6d0124abd41a236149e813f7bdebf0455129725377

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmA:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgO

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      47622bbacb3d00e277667b260e25d6962e7380cbb3e0da10c68c9307b33cc56e

    • Size

      95KB

    • MD5

      ae4ad0d2635c7458d35e331e357ba578

    • SHA1

      2c330936247a18578ea6cfaac1d10a9ac132d93d

    • SHA256

      47622bbacb3d00e277667b260e25d6962e7380cbb3e0da10c68c9307b33cc56e

    • SHA512

      a47d5fb76888c45198af6247ca7de7ca01ddf6f1113b65c846ca296830f2368ee81a2a5556be7d5bf4f41f6d0124abd41a236149e813f7bdebf0455129725377

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmA:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgO

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks