General

  • Target

    df6bb51cc4012fdff6aefc2e61756013950f3d74c2863d01eb09792701d3dd21

  • Size

    74KB

  • Sample

    241120-fskrma1pe1

  • MD5

    1b72ee7aea9a4e369fdf19ff2ee2981a

  • SHA1

    0a4c4f4935496244474bfba5ab018a96b2bf4687

  • SHA256

    df6bb51cc4012fdff6aefc2e61756013950f3d74c2863d01eb09792701d3dd21

  • SHA512

    9d5b1b72cf07f95df4ea43b53a49b43365039dc476ef70405bdb53e6f08df6faebc25e83eb629daed162ae29f38df769112929a6964b58eb9d0927aa8ed31393

  • SSDEEP

    1536:VTOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTKHuS4NcTO9/z7UYdEJBc:VaKpb8rGYrMPe3q7Q0XV5xtezEsi8/dE

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bdtin.com/cache/4G8pl/

xlm40.dropper

http://bascoysonido.com.ar/cgi-bin/AmUUPhWK6oTKLzHpl7zm/

xlm40.dropper

http://basnetbd.com/ckfinder/K0a/

Targets

    • Target

      df6bb51cc4012fdff6aefc2e61756013950f3d74c2863d01eb09792701d3dd21

    • Size

      74KB

    • MD5

      1b72ee7aea9a4e369fdf19ff2ee2981a

    • SHA1

      0a4c4f4935496244474bfba5ab018a96b2bf4687

    • SHA256

      df6bb51cc4012fdff6aefc2e61756013950f3d74c2863d01eb09792701d3dd21

    • SHA512

      9d5b1b72cf07f95df4ea43b53a49b43365039dc476ef70405bdb53e6f08df6faebc25e83eb629daed162ae29f38df769112929a6964b58eb9d0927aa8ed31393

    • SSDEEP

      1536:VTOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTKHuS4NcTO9/z7UYdEJBc:VaKpb8rGYrMPe3q7Q0XV5xtezEsi8/dE

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks