General

  • Target

    640619960ee7f212634676785ffd414b02532a9001180351089aba66e29c4e4b

  • Size

    40KB

  • Sample

    241120-lr8d7awamr

  • MD5

    e63aa327b2c3c3fa10dd8afee7a58f0a

  • SHA1

    d636f1d1179b7e3d7bb41f25d476d9bfe41c80f8

  • SHA256

    640619960ee7f212634676785ffd414b02532a9001180351089aba66e29c4e4b

  • SHA512

    2cf9da041b1a04b645249698e5a6f7065a37181e7ad61f387b9ba606d99862a636ca45cf4d8ff0789b4a0e20e1848180259c277eff19e3bd1911516d0d7a8034

  • SSDEEP

    768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1lM:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dU

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://easiercommunications.com/wp-content/w/

xlm40.dropper

http://dulichdichvu.net/libraries/QhtrjCZymLp5EbqOdpKk/

xlm40.dropper

https://www.whow.fr/wp-includes/H54Fgj0tG/

xlm40.dropper

http://genccagdas.com.tr/assets/TTHOm833iNn3BxT/

xlm40.dropper

http://heaventechnologies.com.pk/apitest/xdeAU0rx26LT9I/

xlm40.dropper

http://goonboy.com/goonie/bSFz7Av/

Targets

    • Target

      640619960ee7f212634676785ffd414b02532a9001180351089aba66e29c4e4b

    • Size

      40KB

    • MD5

      e63aa327b2c3c3fa10dd8afee7a58f0a

    • SHA1

      d636f1d1179b7e3d7bb41f25d476d9bfe41c80f8

    • SHA256

      640619960ee7f212634676785ffd414b02532a9001180351089aba66e29c4e4b

    • SHA512

      2cf9da041b1a04b645249698e5a6f7065a37181e7ad61f387b9ba606d99862a636ca45cf4d8ff0789b4a0e20e1848180259c277eff19e3bd1911516d0d7a8034

    • SSDEEP

      768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1lM:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dU

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks