General

  • Target

    44ceefe764a0329b03eb74c3f8a5b7fc4c4c6939797415bbf283c562db0abda3

  • Size

    110KB

  • Sample

    241120-jpye4avarl

  • MD5

    2ff9c406775a6ba995f62d080c221b30

  • SHA1

    8daf2422a208e1feff27106310890268b4b5f136

  • SHA256

    44ceefe764a0329b03eb74c3f8a5b7fc4c4c6939797415bbf283c562db0abda3

  • SHA512

    6150d8a082e3f778303e95fe4e17a44052e88d25cf9a06e9782b4c9bf64a421b71e0ca2b9da4e4728c7ed3f91a87069614a2c22503a2e21971af63b556ed1130

  • SSDEEP

    3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnxc:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://duvarkagitlarimodelleri.com/42hhp/gZXakh7/

xlm40.dropper

https://dolphinwavehavuzrobotu.com/wp-includes/RmCbvIKjjtlB3tabyPo/

xlm40.dropper

http://animalsandusfujairah.com/wp-admin/JWO58zeUOwSI/

Targets

    • Target

      44ceefe764a0329b03eb74c3f8a5b7fc4c4c6939797415bbf283c562db0abda3

    • Size

      110KB

    • MD5

      2ff9c406775a6ba995f62d080c221b30

    • SHA1

      8daf2422a208e1feff27106310890268b4b5f136

    • SHA256

      44ceefe764a0329b03eb74c3f8a5b7fc4c4c6939797415bbf283c562db0abda3

    • SHA512

      6150d8a082e3f778303e95fe4e17a44052e88d25cf9a06e9782b4c9bf64a421b71e0ca2b9da4e4728c7ed3f91a87069614a2c22503a2e21971af63b556ed1130

    • SSDEEP

      3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnxc:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks