General

  • Target

    a23f89284ddc9b15789e833724f70e9b034e24d8a431f5b51af33212d9a00616

  • Size

    56KB

  • Sample

    241120-gbfa9asgqr

  • MD5

    501341064ebc369bf6a17bee132bb100

  • SHA1

    6628f5cf2b195889500d1d4fd0bc74f339bc36ef

  • SHA256

    a23f89284ddc9b15789e833724f70e9b034e24d8a431f5b51af33212d9a00616

  • SHA512

    2b68eefb655df2d9f84989c5e8f72e72cd2c737726966b97234db00f570d02ef7052d23d36cc029a49f607df9e956edfcc5e895a3ad90db7f33922288cf14f0f

  • SSDEEP

    1536:CUsgWy4WV8cPkkhN+8ZvOVWoNwlQolOko3t0F5uVAwk6:Nsnbcpn+8ZGIFK73tMQ5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.equus.com/2i8yt/GhBSz6peG/

Targets

    • Target

      a23f89284ddc9b15789e833724f70e9b034e24d8a431f5b51af33212d9a00616

    • Size

      56KB

    • MD5

      501341064ebc369bf6a17bee132bb100

    • SHA1

      6628f5cf2b195889500d1d4fd0bc74f339bc36ef

    • SHA256

      a23f89284ddc9b15789e833724f70e9b034e24d8a431f5b51af33212d9a00616

    • SHA512

      2b68eefb655df2d9f84989c5e8f72e72cd2c737726966b97234db00f570d02ef7052d23d36cc029a49f607df9e956edfcc5e895a3ad90db7f33922288cf14f0f

    • SSDEEP

      1536:CUsgWy4WV8cPkkhN+8ZvOVWoNwlQolOko3t0F5uVAwk6:Nsnbcpn+8ZGIFK73tMQ5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks