General

  • Target

    d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c

  • Size

    95KB

  • Sample

    241120-l2d84awbln

  • MD5

    2afcb10cd2606d11f84dcab152cd38b1

  • SHA1

    210b11a4cbd9c32da4e5dbad4d01d62006cbc624

  • SHA256

    d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c

  • SHA512

    bf6d21a78838369ef37f16a0f9fda36c83dcc63eee6185bd752fd800eb201939e377f1257e4a1f866cd62582d301a270a779e1f8ea9cf56871e4a7b8f6b1824d

  • SSDEEP

    1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgCHuS4hcTO97v7UYdEJmIr:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dge

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.sunflowerlaboratory.in/fonts/79Tq62ly/

xlm40.dropper

http://dirigent.co.uk/vardagsekonomi/iC36jJ4J1cf/

xlm40.dropper

http://agtrade.hu/images/kiQYmOs2tSKq/

xlm40.dropper

https://www.zachboyle.com/wp-admin/EA470ZrTGNkuA/

Targets

    • Target

      d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c

    • Size

      95KB

    • MD5

      2afcb10cd2606d11f84dcab152cd38b1

    • SHA1

      210b11a4cbd9c32da4e5dbad4d01d62006cbc624

    • SHA256

      d2efa420a245e76e5418e68716224b5091be819dea739c2bb93bcb960852952c

    • SHA512

      bf6d21a78838369ef37f16a0f9fda36c83dcc63eee6185bd752fd800eb201939e377f1257e4a1f866cd62582d301a270a779e1f8ea9cf56871e4a7b8f6b1824d

    • SSDEEP

      1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgCHuS4hcTO97v7UYdEJmIr:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dge

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks