General

  • Target

    d899c10347be124bc39fe2b09396a4d7e21bb76334485103ec4be77b2a1d63ac

  • Size

    95KB

  • Sample

    241120-gf6c8ssanc

  • MD5

    fca1bc7d9b99957d5243c09fa7faf82a

  • SHA1

    010488bebe2b9b0b3c5152f214ef65adb7a99d40

  • SHA256

    d899c10347be124bc39fe2b09396a4d7e21bb76334485103ec4be77b2a1d63ac

  • SHA512

    76b4836cc287b5381289857821c07e39cc85b27dafb2eb2f2a2dc3a5c91cb9f38283c372078ab2d28eec5dcdf82720ea471e1f3e8f2878aa28e307a855f95594

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmQ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgW

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      d899c10347be124bc39fe2b09396a4d7e21bb76334485103ec4be77b2a1d63ac

    • Size

      95KB

    • MD5

      fca1bc7d9b99957d5243c09fa7faf82a

    • SHA1

      010488bebe2b9b0b3c5152f214ef65adb7a99d40

    • SHA256

      d899c10347be124bc39fe2b09396a4d7e21bb76334485103ec4be77b2a1d63ac

    • SHA512

      76b4836cc287b5381289857821c07e39cc85b27dafb2eb2f2a2dc3a5c91cb9f38283c372078ab2d28eec5dcdf82720ea471e1f3e8f2878aa28e307a855f95594

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmQ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgW

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks