General

  • Target

    48cf3cc178fb25c9498b10280f1247c599c628d531db0d28a4ff86a48f4c1464

  • Size

    96KB

  • Sample

    241120-de16caypez

  • MD5

    68e21cbe3dee016ef337100eaa25f507

  • SHA1

    d4b6398db6c6076b57f148cbafd8d7675a581d2e

  • SHA256

    48cf3cc178fb25c9498b10280f1247c599c628d531db0d28a4ff86a48f4c1464

  • SHA512

    d2cc3f0865262ea73ad264c308012c27e58be99a5eaf42c736614d3fec33136e661ef582385d0b9d58279a42d97d29a0219cea6827740ada9e1532ca1c9bbcef

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm39:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgF

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fisika.mipa.uns.ac.id/reseller/img/nRAvAgoY8Y/

xlm40.dropper

http://greycoconut.com/edm/71qUA/

xlm40.dropper

http://zonainformatica.es/tienda/XCHJmidSYTkE/

xlm40.dropper

http://balletmagazine.ro/wp-content/9VrMPV/

Targets

    • Target

      48cf3cc178fb25c9498b10280f1247c599c628d531db0d28a4ff86a48f4c1464

    • Size

      96KB

    • MD5

      68e21cbe3dee016ef337100eaa25f507

    • SHA1

      d4b6398db6c6076b57f148cbafd8d7675a581d2e

    • SHA256

      48cf3cc178fb25c9498b10280f1247c599c628d531db0d28a4ff86a48f4c1464

    • SHA512

      d2cc3f0865262ea73ad264c308012c27e58be99a5eaf42c736614d3fec33136e661ef582385d0b9d58279a42d97d29a0219cea6827740ada9e1532ca1c9bbcef

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm39:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgF

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks