General

  • Target

    668be3761c6256ebd081da9c1eca2964ee06c69792304fe6b191b062ca631a89

  • Size

    77KB

  • Sample

    241120-kdnbestqgx

  • MD5

    9f2ff0b51620c55448d2b76ed96e9862

  • SHA1

    0c35f5c5a14ec5c3d1477fd668c248d5105099e7

  • SHA256

    668be3761c6256ebd081da9c1eca2964ee06c69792304fe6b191b062ca631a89

  • SHA512

    eb15e18610fc6e89b7f827bb3356abdab2660c976af30100fc913e498dc64ab19a1a98c1a56baf894d7cc750e62e40b55290bfe46c4f41a7453fd78acda87d32

  • SSDEEP

    1536:ZSKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTk+hD8nTLqQrRrZws8Etr:gKpb8rGYrMPe3q7Q0XV5xtezEsi8/dga

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://microlent.com/admin/kM442bdMLLMQ1qJe5/

xlm40.dropper

https://neoexc.com/cgi-bin/srN0xYgm/

xlm40.dropper

http://ong-hananel.org/PAQUES/bPiA2l6foj7kjN/

Targets

    • Target

      668be3761c6256ebd081da9c1eca2964ee06c69792304fe6b191b062ca631a89

    • Size

      77KB

    • MD5

      9f2ff0b51620c55448d2b76ed96e9862

    • SHA1

      0c35f5c5a14ec5c3d1477fd668c248d5105099e7

    • SHA256

      668be3761c6256ebd081da9c1eca2964ee06c69792304fe6b191b062ca631a89

    • SHA512

      eb15e18610fc6e89b7f827bb3356abdab2660c976af30100fc913e498dc64ab19a1a98c1a56baf894d7cc750e62e40b55290bfe46c4f41a7453fd78acda87d32

    • SSDEEP

      1536:ZSKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTk+hD8nTLqQrRrZws8Etr:gKpb8rGYrMPe3q7Q0XV5xtezEsi8/dga

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks