General

  • Target

    cdfee1d66799bc0e13e28fadcf801e2e11e664bb797916a7dcc7e29449597c16

  • Size

    95KB

  • Sample

    241120-eb4bzaznbv

  • MD5

    e92bf5c67cb59db15094cf2b9a57bcd7

  • SHA1

    220e7cde25492e0e8fd818c8247170cc4e857003

  • SHA256

    cdfee1d66799bc0e13e28fadcf801e2e11e664bb797916a7dcc7e29449597c16

  • SHA512

    6fe51addff3c8188f590afcce352949036b773631ab35640100a0b73d89ad735b996c022b45c2ec15c384984163b6cdcc770f84731f8d3747185def1e81a9c8f

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYHuS4hcTO97v7UYdEJmF12:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://educacionsanvicentefundacion.com/iplookup/wYEInbaN/

xlm40.dropper

https://www.4monkeys.com/wp-admin/dNAuBEKo/

xlm40.dropper

http://haircutbar.com/cgi-bin/dNfEA5F/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/T0J9THbd5f2/

Targets

    • Target

      cdfee1d66799bc0e13e28fadcf801e2e11e664bb797916a7dcc7e29449597c16

    • Size

      95KB

    • MD5

      e92bf5c67cb59db15094cf2b9a57bcd7

    • SHA1

      220e7cde25492e0e8fd818c8247170cc4e857003

    • SHA256

      cdfee1d66799bc0e13e28fadcf801e2e11e664bb797916a7dcc7e29449597c16

    • SHA512

      6fe51addff3c8188f590afcce352949036b773631ab35640100a0b73d89ad735b996c022b45c2ec15c384984163b6cdcc770f84731f8d3747185def1e81a9c8f

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYHuS4hcTO97v7UYdEJmF12:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks