General

  • Target

    9231fb1f6635e49a65bbc1cd0e205da1c9dbc9d565ed2a1737613d41b47cd39a

  • Size

    95KB

  • Sample

    241120-kqaabstglf

  • MD5

    25682a4ca7384faa39c36dde43c37d07

  • SHA1

    2ac6de4c5205e8c74ddb6352d03c22fbf48ba0db

  • SHA256

    9231fb1f6635e49a65bbc1cd0e205da1c9dbc9d565ed2a1737613d41b47cd39a

  • SHA512

    1fefb7a468956748ce9ee1a0046580782f33e3acd63caddc018d343cf763f581d1c1753cf5c855fd4dd5d0d803e8aa2e204dba133c9687c27a467c2858baf4d4

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmQ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dge

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      9231fb1f6635e49a65bbc1cd0e205da1c9dbc9d565ed2a1737613d41b47cd39a

    • Size

      95KB

    • MD5

      25682a4ca7384faa39c36dde43c37d07

    • SHA1

      2ac6de4c5205e8c74ddb6352d03c22fbf48ba0db

    • SHA256

      9231fb1f6635e49a65bbc1cd0e205da1c9dbc9d565ed2a1737613d41b47cd39a

    • SHA512

      1fefb7a468956748ce9ee1a0046580782f33e3acd63caddc018d343cf763f581d1c1753cf5c855fd4dd5d0d803e8aa2e204dba133c9687c27a467c2858baf4d4

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmQ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dge

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks