General

  • Target

    45e8e29839193164d1246611825060f46fdedfd515a8cb52e8dbf1a2dbb54d1c

  • Size

    74KB

  • Sample

    241120-ml5xjszngq

  • MD5

    95cf4e0fa3165096aa664aa251e4d4bc

  • SHA1

    a90284ee8bfb991ae3b24a43c55e10a3d258825c

  • SHA256

    45e8e29839193164d1246611825060f46fdedfd515a8cb52e8dbf1a2dbb54d1c

  • SHA512

    509b7ff79f030bd19ca1587c0a4f45c82b87b2c2ed80563607067d99f7955e7dd1ef667b427cd111036327dae7724a83b7bd796831d8f0c16fd539b9d66c0ffd

  • SSDEEP

    1536:VTOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTKHuS4NcTO9/z7UYdEJBo:VaKpb8rGYrMPe3q7Q0XV5xtezEsi8/dw

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bdtin.com/cache/4G8pl/

xlm40.dropper

http://bascoysonido.com.ar/cgi-bin/AmUUPhWK6oTKLzHpl7zm/

xlm40.dropper

http://basnetbd.com/ckfinder/K0a/

Targets

    • Target

      45e8e29839193164d1246611825060f46fdedfd515a8cb52e8dbf1a2dbb54d1c

    • Size

      74KB

    • MD5

      95cf4e0fa3165096aa664aa251e4d4bc

    • SHA1

      a90284ee8bfb991ae3b24a43c55e10a3d258825c

    • SHA256

      45e8e29839193164d1246611825060f46fdedfd515a8cb52e8dbf1a2dbb54d1c

    • SHA512

      509b7ff79f030bd19ca1587c0a4f45c82b87b2c2ed80563607067d99f7955e7dd1ef667b427cd111036327dae7724a83b7bd796831d8f0c16fd539b9d66c0ffd

    • SSDEEP

      1536:VTOKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTKHuS4NcTO9/z7UYdEJBo:VaKpb8rGYrMPe3q7Q0XV5xtezEsi8/dw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks