General

  • Target

    d2d1ac4ef1647c720d76c02b6a0aacf3bba91a8c6944da42d7146994a74cbfc4

  • Size

    95KB

  • Sample

    241120-ltsrhsvcnf

  • MD5

    4200ceef2b192a150589c896a0316df8

  • SHA1

    ac49a71fb3003f24a1c83df6225704d5b44e036b

  • SHA256

    d2d1ac4ef1647c720d76c02b6a0aacf3bba91a8c6944da42d7146994a74cbfc4

  • SHA512

    26429ae48426a17cf993e9eed0d238665922db8a044b607cfbd018f1ae0146e6441ec536ed974160133189a79ba828dc500dd049f75933a9e0f1672c76b128cf

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmJ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      d2d1ac4ef1647c720d76c02b6a0aacf3bba91a8c6944da42d7146994a74cbfc4

    • Size

      95KB

    • MD5

      4200ceef2b192a150589c896a0316df8

    • SHA1

      ac49a71fb3003f24a1c83df6225704d5b44e036b

    • SHA256

      d2d1ac4ef1647c720d76c02b6a0aacf3bba91a8c6944da42d7146994a74cbfc4

    • SHA512

      26429ae48426a17cf993e9eed0d238665922db8a044b607cfbd018f1ae0146e6441ec536ed974160133189a79ba828dc500dd049f75933a9e0f1672c76b128cf

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmJ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks