General

  • Target

    506fa5fbf6543c7484a9652cb83384ff7a63caa75ec9051d98ed7e976fc4c32a

  • Size

    95KB

  • Sample

    241120-fwf8ls1qct

  • MD5

    0e84ef3a07c287b2ac00d7e07b9158ad

  • SHA1

    8f089b59ee2f9f78f516eb626d7fcda2ebfb7241

  • SHA256

    506fa5fbf6543c7484a9652cb83384ff7a63caa75ec9051d98ed7e976fc4c32a

  • SHA512

    6ea3a480d57e16b0a0c389ee577678a4f08dbf406f0c7bdc80a48e7b7a4d107e55711c709ac16bb72e6a67194a119732b14017b652330f4d903d4ff6578d5697

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJms:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      506fa5fbf6543c7484a9652cb83384ff7a63caa75ec9051d98ed7e976fc4c32a

    • Size

      95KB

    • MD5

      0e84ef3a07c287b2ac00d7e07b9158ad

    • SHA1

      8f089b59ee2f9f78f516eb626d7fcda2ebfb7241

    • SHA256

      506fa5fbf6543c7484a9652cb83384ff7a63caa75ec9051d98ed7e976fc4c32a

    • SHA512

      6ea3a480d57e16b0a0c389ee577678a4f08dbf406f0c7bdc80a48e7b7a4d107e55711c709ac16bb72e6a67194a119732b14017b652330f4d903d4ff6578d5697

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJms:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks