General

  • Target

    e1b18cefc37dd82db929e8d0ba0b0c6ae9cf6b937d378eb962de4d04f7652c5d

  • Size

    46KB

  • Sample

    241120-ehyeaszpcz

  • MD5

    da7f30b7c8c5906d6b90369913553b31

  • SHA1

    66063e1cda7ba84a388a081998c224b61dd60242

  • SHA256

    e1b18cefc37dd82db929e8d0ba0b0c6ae9cf6b937d378eb962de4d04f7652c5d

  • SHA512

    509d568eb777c770da8be0ec23bae325fcbbd99cd94716b72b5aa51ee5ab4e4b3ca07342c98a3a62390229d3371ee090543186529a9fc7050d6aa6624b91c7b9

  • SSDEEP

    768:pDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VgTBs7QqvZQ4tsdur/:pYKpb8rGYrMPe3q7Q0XV5xtezE8vG8U/

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://202.29.80.55/2021/z/

xlm40.dropper

http://23.239.12.243/dealspot/SvebxVmFucz/

xlm40.dropper

https://adviceme.gr/test/SSzbOkk633/

Targets

    • Target

      e1b18cefc37dd82db929e8d0ba0b0c6ae9cf6b937d378eb962de4d04f7652c5d

    • Size

      46KB

    • MD5

      da7f30b7c8c5906d6b90369913553b31

    • SHA1

      66063e1cda7ba84a388a081998c224b61dd60242

    • SHA256

      e1b18cefc37dd82db929e8d0ba0b0c6ae9cf6b937d378eb962de4d04f7652c5d

    • SHA512

      509d568eb777c770da8be0ec23bae325fcbbd99cd94716b72b5aa51ee5ab4e4b3ca07342c98a3a62390229d3371ee090543186529a9fc7050d6aa6624b91c7b9

    • SSDEEP

      768:pDMPKpb8rGYrMPe3q7Q0XV5xtezE8vpI8UM+VgTBs7QqvZQ4tsdur/:pYKpb8rGYrMPe3q7Q0XV5xtezE8vG8U/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks