General

  • Target

    e6f65579dd34eae9b8d4e60ccb68a5805388c6ba01683ba4e89864b95b514215

  • Size

    95KB

  • Sample

    241120-mjf6eavfkc

  • MD5

    f03b81ce0234415c3f53b80280942726

  • SHA1

    ce06e6b0bb8988b1a8a35cc7962d209688d95a9f

  • SHA256

    e6f65579dd34eae9b8d4e60ccb68a5805388c6ba01683ba4e89864b95b514215

  • SHA512

    c07b389320caf46a0f9a945bbedc24d2052b27d7bbbb53efe531432fa909e897c5bfa50710c7fb66216f57762f98b9e3109bf26fb7331724c86126e4cb0d7d5c

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCA+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://francite.net/images/XI7zS0X1nY/

xlm40.dropper

https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/

xlm40.dropper

http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/

Targets

    • Target

      e6f65579dd34eae9b8d4e60ccb68a5805388c6ba01683ba4e89864b95b514215

    • Size

      95KB

    • MD5

      f03b81ce0234415c3f53b80280942726

    • SHA1

      ce06e6b0bb8988b1a8a35cc7962d209688d95a9f

    • SHA256

      e6f65579dd34eae9b8d4e60ccb68a5805388c6ba01683ba4e89864b95b514215

    • SHA512

      c07b389320caf46a0f9a945bbedc24d2052b27d7bbbb53efe531432fa909e897c5bfa50710c7fb66216f57762f98b9e3109bf26fb7331724c86126e4cb0d7d5c

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCA+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks