General

  • Target

    8fba84e07fa2205672816de1c1c48eb5e1d01ed965c489784b30afa20a6d3dd1

  • Size

    53KB

  • Sample

    241120-mndwvavfpd

  • MD5

    5e4c18aa13ae536e5354212f6cd62d17

  • SHA1

    34289b0ad7f4976bacafa7c1cf7a1bc651c392c6

  • SHA256

    8fba84e07fa2205672816de1c1c48eb5e1d01ed965c489784b30afa20a6d3dd1

  • SHA512

    07a9cc0b44189c5599feb50cbcc199929cf281ece193b080cfe2a4a4ae7aeb420ef4b5c1aa1e724e8432af46001de522a995ce6267d9edc12a9f0ebba39082ce

  • SSDEEP

    1536:LPKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+bSgNeEYL8ECyP:rKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMF

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://newkano.com/wp-admin/66rIsrVwoPKUsjcAs/

xlm40.dropper

http://ocalogullari.com/inc/Wcm82enrs8/

xlm40.dropper

https://myphamcuatui.com/assets/OPVeVSpO/

xlm40.dropper

http://sieuthiphutungxenang.com/old_source/9boJQZpTSdQE/

Targets

    • Target

      8fba84e07fa2205672816de1c1c48eb5e1d01ed965c489784b30afa20a6d3dd1

    • Size

      53KB

    • MD5

      5e4c18aa13ae536e5354212f6cd62d17

    • SHA1

      34289b0ad7f4976bacafa7c1cf7a1bc651c392c6

    • SHA256

      8fba84e07fa2205672816de1c1c48eb5e1d01ed965c489784b30afa20a6d3dd1

    • SHA512

      07a9cc0b44189c5599feb50cbcc199929cf281ece193b080cfe2a4a4ae7aeb420ef4b5c1aa1e724e8432af46001de522a995ce6267d9edc12a9f0ebba39082ce

    • SSDEEP

      1536:LPKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+bSgNeEYL8ECyP:rKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMF

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks