General

  • Target

    37e2518cb0cc81fc0cb986d84b5861d9163661e506a2c8d8001128ceccd6b840

  • Size

    71KB

  • Sample

    241120-mrzygszpbr

  • MD5

    cf3d14c4ee10b847dedcbb2f4b0c7c21

  • SHA1

    768467a82bcde8affa686a9b66393262221842b6

  • SHA256

    37e2518cb0cc81fc0cb986d84b5861d9163661e506a2c8d8001128ceccd6b840

  • SHA512

    74b3c532249fe991d00a6420f790f95bf7b4e9ce7410de51b9317ea74fda4bb52a51f4a63b3168e0cd75e58905d7219800f9fc18b90a4ef686d2be3ece515847

  • SSDEEP

    1536:DhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+J+hDcnTLiQrRTZws8E3:FKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://burgarellaquantumhealing.org/NRl0YMBGNh8i/

xlm40.dropper

https://faisonfilms.com/wp-includes/jOA/

xlm40.dropper

http://roviel.mx/wp-includes/uX2WDFhrE/

Targets

    • Target

      37e2518cb0cc81fc0cb986d84b5861d9163661e506a2c8d8001128ceccd6b840

    • Size

      71KB

    • MD5

      cf3d14c4ee10b847dedcbb2f4b0c7c21

    • SHA1

      768467a82bcde8affa686a9b66393262221842b6

    • SHA256

      37e2518cb0cc81fc0cb986d84b5861d9163661e506a2c8d8001128ceccd6b840

    • SHA512

      74b3c532249fe991d00a6420f790f95bf7b4e9ce7410de51b9317ea74fda4bb52a51f4a63b3168e0cd75e58905d7219800f9fc18b90a4ef686d2be3ece515847

    • SSDEEP

      1536:DhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+J+hDcnTLiQrRTZws8E3:FKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks