General

  • Target

    9e7eaf569c8f3dbe07baae8cb1e136e70adf653f70c4dd07f21de95be8ec33bc

  • Size

    91KB

  • Sample

    241120-l494jsvpdt

  • MD5

    d405a8cacb7f8fd3f84b710ce2c786ec

  • SHA1

    87bbae07712e78232843875fab976e8dfa2c3e57

  • SHA256

    9e7eaf569c8f3dbe07baae8cb1e136e70adf653f70c4dd07f21de95be8ec33bc

  • SHA512

    8d1b33f7d2f291a96623579f76fa9f21086338bdb48e9a02146192e03cbadc2683943a46626b315373e683edf2729f7109a2293f2536bd685985c1168420fa83

  • SSDEEP

    1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEbCXuZH4gb4CEn9J4Z8EM:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgV

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.muyehuayi.com/cmp/8asA99KPsyA/v6lUsWbLen/

xlm40.dropper

http://concivilpa.com.py/wp-admin/i3CQu9dzDrMW/

xlm40.dropper

https://wijsneusmedia.nl/cgi-bin/kFB/

xlm40.dropper

http://www.angloextrema.com.br/assets/oEt1yYckHKlnNIq/

Targets

    • Target

      9e7eaf569c8f3dbe07baae8cb1e136e70adf653f70c4dd07f21de95be8ec33bc

    • Size

      91KB

    • MD5

      d405a8cacb7f8fd3f84b710ce2c786ec

    • SHA1

      87bbae07712e78232843875fab976e8dfa2c3e57

    • SHA256

      9e7eaf569c8f3dbe07baae8cb1e136e70adf653f70c4dd07f21de95be8ec33bc

    • SHA512

      8d1b33f7d2f291a96623579f76fa9f21086338bdb48e9a02146192e03cbadc2683943a46626b315373e683edf2729f7109a2293f2536bd685985c1168420fa83

    • SSDEEP

      1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEbCXuZH4gb4CEn9J4Z8EM:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks