General

  • Target

    8f0f911c7fe67db5248c4220e99df3f6870d47c0827cc663f73d161168c1cd8f

  • Size

    53KB

  • Sample

    241120-fhfpxswmdl

  • MD5

    dd4618c9dd0dbe5b16c38a126a8b209e

  • SHA1

    bb6ac922d8b2996cea91432b378806d3faff953b

  • SHA256

    8f0f911c7fe67db5248c4220e99df3f6870d47c0827cc663f73d161168c1cd8f

  • SHA512

    ab5be9bd4683e26065da75e78f17710155736edb82d08a34408e22a8d485935bb888b08ea205436b5947f4730a99a3a71e43c92b7e0c553d65b85d0962063eac

  • SSDEEP

    1536:LPKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+bSgNeEYL8ECyn:rKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMN

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://newkano.com/wp-admin/66rIsrVwoPKUsjcAs/

xlm40.dropper

http://ocalogullari.com/inc/Wcm82enrs8/

xlm40.dropper

https://myphamcuatui.com/assets/OPVeVSpO/

xlm40.dropper

http://sieuthiphutungxenang.com/old_source/9boJQZpTSdQE/

Targets

    • Target

      8f0f911c7fe67db5248c4220e99df3f6870d47c0827cc663f73d161168c1cd8f

    • Size

      53KB

    • MD5

      dd4618c9dd0dbe5b16c38a126a8b209e

    • SHA1

      bb6ac922d8b2996cea91432b378806d3faff953b

    • SHA256

      8f0f911c7fe67db5248c4220e99df3f6870d47c0827cc663f73d161168c1cd8f

    • SHA512

      ab5be9bd4683e26065da75e78f17710155736edb82d08a34408e22a8d485935bb888b08ea205436b5947f4730a99a3a71e43c92b7e0c553d65b85d0962063eac

    • SSDEEP

      1536:LPKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+bSgNeEYL8ECyn:rKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMN

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks