General

  • Target

    82f3b8fc86215f5334fe72560b75c128add25e6df7d066cd1e8af8c696be1dfd

  • Size

    95KB

  • Sample

    241120-jrc7yaylcq

  • MD5

    0e04ccbfd1b7263aa2058420db1f5ed8

  • SHA1

    b71316cb4b1d884c32012475f6699c6421c964b2

  • SHA256

    82f3b8fc86215f5334fe72560b75c128add25e6df7d066cd1e8af8c696be1dfd

  • SHA512

    b1706ad919d475a82e422af0ba56e20c592508c71e0e5ff3ab4d2cf1bf3f9c50e20f8b553878dcb264996edd42983727a386d3cb3463b5678f6f8218a1d68419

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm9:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgA

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      82f3b8fc86215f5334fe72560b75c128add25e6df7d066cd1e8af8c696be1dfd

    • Size

      95KB

    • MD5

      0e04ccbfd1b7263aa2058420db1f5ed8

    • SHA1

      b71316cb4b1d884c32012475f6699c6421c964b2

    • SHA256

      82f3b8fc86215f5334fe72560b75c128add25e6df7d066cd1e8af8c696be1dfd

    • SHA512

      b1706ad919d475a82e422af0ba56e20c592508c71e0e5ff3ab4d2cf1bf3f9c50e20f8b553878dcb264996edd42983727a386d3cb3463b5678f6f8218a1d68419

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm9:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgA

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks