General

  • Target

    92967070011f80dff6f5f935bb43709d4bf699d3258206007b98e5e550e24abd

  • Size

    91KB

  • Sample

    241120-lxeztswarn

  • MD5

    160f8222b71a3a90ed0113ba9f22e96b

  • SHA1

    413deb4f1b829b50821356731add0c8d1d6da8c6

  • SHA256

    92967070011f80dff6f5f935bb43709d4bf699d3258206007b98e5e550e24abd

  • SHA512

    8212c575f8389ba7241e341d1b753135e4eec85b92ff10f53352d33922fdcef11910881eef640f428878577e32dc22a44e34c92f7d71cc09fe0a67c20213b053

  • SSDEEP

    1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dggbCXuZH4gb4CEn9J4Z8HM:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgG

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://yesdeko.com/app/mydLAE/

xlm40.dropper

http://demo.cansunoto.com/lYqTuQ0qe5r2Y/JM1VqkOTTwt7Bvsu/

xlm40.dropper

http://cultura.educad.pe/wp-content/Vy5ft0Rw/

xlm40.dropper

http://nlasandbox3.com/backup/iCxLdPuH6tfxDQR2/

Targets

    • Target

      92967070011f80dff6f5f935bb43709d4bf699d3258206007b98e5e550e24abd

    • Size

      91KB

    • MD5

      160f8222b71a3a90ed0113ba9f22e96b

    • SHA1

      413deb4f1b829b50821356731add0c8d1d6da8c6

    • SHA256

      92967070011f80dff6f5f935bb43709d4bf699d3258206007b98e5e550e24abd

    • SHA512

      8212c575f8389ba7241e341d1b753135e4eec85b92ff10f53352d33922fdcef11910881eef640f428878577e32dc22a44e34c92f7d71cc09fe0a67c20213b053

    • SSDEEP

      1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dggbCXuZH4gb4CEn9J4Z8HM:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgG

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks