General

  • Target

    fab2a45065a4a9a01b660ac421957fb5f695cc1c9b00a08ab8cb44890374e222

  • Size

    71KB

  • Sample

    241120-e7dq7awkdq

  • MD5

    6b7f93268bdec780febd3e8b62a124a3

  • SHA1

    3e1c2719806b7b5080cb98fa3fdcbc9c140e1b12

  • SHA256

    fab2a45065a4a9a01b660ac421957fb5f695cc1c9b00a08ab8cb44890374e222

  • SHA512

    78fbeca607f367bd184642bd99f628970e7ffcbab4fd9b0294e953733153ad487eb118a45bdcc6962f7d9804913961931e4dad6a5f4f029e1dfb45d5873e5d13

  • SSDEEP

    1536:jhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+gT+hDcnTLiQrRTZws8Ew:lKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMq

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://sweetzone.co/js/XVK/

xlm40.dropper

https://tassa.mx/edos/1hHlIQO/

xlm40.dropper

http://assaref.ma/old_assaref/A2B3P/

Targets

    • Target

      fab2a45065a4a9a01b660ac421957fb5f695cc1c9b00a08ab8cb44890374e222

    • Size

      71KB

    • MD5

      6b7f93268bdec780febd3e8b62a124a3

    • SHA1

      3e1c2719806b7b5080cb98fa3fdcbc9c140e1b12

    • SHA256

      fab2a45065a4a9a01b660ac421957fb5f695cc1c9b00a08ab8cb44890374e222

    • SHA512

      78fbeca607f367bd184642bd99f628970e7ffcbab4fd9b0294e953733153ad487eb118a45bdcc6962f7d9804913961931e4dad6a5f4f029e1dfb45d5873e5d13

    • SSDEEP

      1536:jhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+gT+hDcnTLiQrRTZws8Ew:lKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks