General

  • Target

    47e197bda4b2b1c286cffbf2d2c8e644ab5519a5aca2c20bfc526910adc600a7

  • Size

    40KB

  • Sample

    241120-lq1yqavcka

  • MD5

    4ec5c4f747b2fa1225cfc3043dfb08b7

  • SHA1

    beaa7f0416a7cf15f6c0bd9aeabc292d56916616

  • SHA256

    47e197bda4b2b1c286cffbf2d2c8e644ab5519a5aca2c20bfc526910adc600a7

  • SHA512

    f981a4c9402e6f152f4facc1d684db1841bb69bb8390bdd4ec197fca2c94fdb789ca9766dd908f22ae6f122113b628c580d46adcf774b01fa1480fbb602ad910

  • SSDEEP

    768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgAdCBn9kC+xbqc6q+otrvEVLcAo:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.itesmeitic.com/term/IFjx5ElE0ldr8wDDHjub/

xlm40.dropper

https://www.ingonherbal.com/application/PhEbceg4Tx/

xlm40.dropper

http://ftp.colibriconstruction.net/cc/KHieqeOsagkmlGIuXc56/

xlm40.dropper

http://commune-ariana.tn/sites/3BvaCmo/

xlm40.dropper

http://dmaicinnovations.com/Swift-5.0.2/jEtePB/

xlm40.dropper

https://drcreative.cz/images/DwThyQntyImCHk0tpba/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.itesmeitic.com/term/IFjx5ElE0ldr8wDDHjub/

Targets

    • Target

      47e197bda4b2b1c286cffbf2d2c8e644ab5519a5aca2c20bfc526910adc600a7

    • Size

      40KB

    • MD5

      4ec5c4f747b2fa1225cfc3043dfb08b7

    • SHA1

      beaa7f0416a7cf15f6c0bd9aeabc292d56916616

    • SHA256

      47e197bda4b2b1c286cffbf2d2c8e644ab5519a5aca2c20bfc526910adc600a7

    • SHA512

      f981a4c9402e6f152f4facc1d684db1841bb69bb8390bdd4ec197fca2c94fdb789ca9766dd908f22ae6f122113b628c580d46adcf774b01fa1480fbb602ad910

    • SSDEEP

      768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgAdCBn9kC+xbqc6q+otrvEVLcAo:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks