General

  • Target

    d5b926a3a10fed07f10d9f0bfc6369227c0270c049f286d4d668c753335d0b6f

  • Size

    56KB

  • Sample

    241120-kr1tnsvenm

  • MD5

    87c238f27386481a0c00d8fe1d92bf5a

  • SHA1

    713ea4557e8e59777c928e706573abe2217140d9

  • SHA256

    d5b926a3a10fed07f10d9f0bfc6369227c0270c049f286d4d668c753335d0b6f

  • SHA512

    6367367abe4f47a8cb72b38475baa9a5ed8194912273996226b04458d4a3cde5dbfe755442e949df3dbb9a0d6249ee3e8b8029cd3937aedc15958b583d8b8381

  • SSDEEP

    1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgx5G9XSZ4XsvG:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dga

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://dharian.org/_sharedtemplates/D3QgytUZsO7korYQrG/

xlm40.dropper

http://digitalripple.com/scripts/4ovLPfq/

Targets

    • Target

      d5b926a3a10fed07f10d9f0bfc6369227c0270c049f286d4d668c753335d0b6f

    • Size

      56KB

    • MD5

      87c238f27386481a0c00d8fe1d92bf5a

    • SHA1

      713ea4557e8e59777c928e706573abe2217140d9

    • SHA256

      d5b926a3a10fed07f10d9f0bfc6369227c0270c049f286d4d668c753335d0b6f

    • SHA512

      6367367abe4f47a8cb72b38475baa9a5ed8194912273996226b04458d4a3cde5dbfe755442e949df3dbb9a0d6249ee3e8b8029cd3937aedc15958b583d8b8381

    • SSDEEP

      1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgx5G9XSZ4XsvG:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dga

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks