General

  • Target

    3f613195628ef4a0ffad100233e965c81c1d56b7c57b48fc59b2154e9ca1e0cc

  • Size

    95KB

  • Sample

    241120-kkb7qstrdx

  • MD5

    bb83367e74e6f1ec5ebd52cc4b293fba

  • SHA1

    0bf653a552555ae9160403c7f1a43aed13307c58

  • SHA256

    3f613195628ef4a0ffad100233e965c81c1d56b7c57b48fc59b2154e9ca1e0cc

  • SHA512

    ce87c39b314f116ee36fa2bba12b933eec7ece80f93b47eef6eb7f1c0df4a3113797353cba596a03b14391a234a3a12550c664bcdaa34f6798c414ebd965681f

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmt:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgQ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      3f613195628ef4a0ffad100233e965c81c1d56b7c57b48fc59b2154e9ca1e0cc

    • Size

      95KB

    • MD5

      bb83367e74e6f1ec5ebd52cc4b293fba

    • SHA1

      0bf653a552555ae9160403c7f1a43aed13307c58

    • SHA256

      3f613195628ef4a0ffad100233e965c81c1d56b7c57b48fc59b2154e9ca1e0cc

    • SHA512

      ce87c39b314f116ee36fa2bba12b933eec7ece80f93b47eef6eb7f1c0df4a3113797353cba596a03b14391a234a3a12550c664bcdaa34f6798c414ebd965681f

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmt:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks