General

  • Target

    10f5cf8f7d8bbf3b86986d9827a99532569d64baa2ddcd7e57c09290884747c5

  • Size

    110KB

  • Sample

    241120-fct1cs1cjd

  • MD5

    b421d776b991f02ec4ce12c6cf791849

  • SHA1

    fc22f05999fdb326447965af0f2ada6159bbb0c0

  • SHA256

    10f5cf8f7d8bbf3b86986d9827a99532569d64baa2ddcd7e57c09290884747c5

  • SHA512

    76a42c9277235de2480f588f31617cdd954c3cd403c03a98f27a3dda4314179ab8bc8882c7531bce475d820563e960ef6581f7f99d8ccd674858299741e367d8

  • SSDEEP

    3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnx8:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVv

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://duvarkagitlarimodelleri.com/42hhp/gZXakh7/

xlm40.dropper

https://dolphinwavehavuzrobotu.com/wp-includes/RmCbvIKjjtlB3tabyPo/

xlm40.dropper

http://animalsandusfujairah.com/wp-admin/JWO58zeUOwSI/

Targets

    • Target

      10f5cf8f7d8bbf3b86986d9827a99532569d64baa2ddcd7e57c09290884747c5

    • Size

      110KB

    • MD5

      b421d776b991f02ec4ce12c6cf791849

    • SHA1

      fc22f05999fdb326447965af0f2ada6159bbb0c0

    • SHA256

      10f5cf8f7d8bbf3b86986d9827a99532569d64baa2ddcd7e57c09290884747c5

    • SHA512

      76a42c9277235de2480f588f31617cdd954c3cd403c03a98f27a3dda4314179ab8bc8882c7531bce475d820563e960ef6581f7f99d8ccd674858299741e367d8

    • SSDEEP

      3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnx8:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks