General

  • Target

    ecde4954ce5a3bf8bf76b66005218084f670b6406d276e58688523e7b10d9b0f

  • Size

    91KB

  • Sample

    241120-nacbjazram

  • MD5

    24c9471ef8ca7f4acfbac2ba476cb479

  • SHA1

    31ee92bfd42e2c9e675726f215d7e08fb9561d3c

  • SHA256

    ecde4954ce5a3bf8bf76b66005218084f670b6406d276e58688523e7b10d9b0f

  • SHA512

    fb9c29d1126eb8e940ceca0f49142840aec14ba2b3bfae7427f92ddfbfccb8e5fd7de29869f3664c8666d5e40dd6b48d9d91ed7fcd05b7e7f59fc1572d711f04

  • SSDEEP

    1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2bCXuZH4gb4CEn9J4Zmcvp:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgu

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bundlefilm.com/headers/lkfBH3Czw9CjEW07P2/

xlm40.dropper

http://camsanparke.net/wp-content/h2Ja5bwB03hnyfCb/

xlm40.dropper

http://royreid.co.uk/wp-content/dCwG/

xlm40.dropper

https://cs.com.sg/admin/a1lR5wu/

Targets

    • Target

      ecde4954ce5a3bf8bf76b66005218084f670b6406d276e58688523e7b10d9b0f

    • Size

      91KB

    • MD5

      24c9471ef8ca7f4acfbac2ba476cb479

    • SHA1

      31ee92bfd42e2c9e675726f215d7e08fb9561d3c

    • SHA256

      ecde4954ce5a3bf8bf76b66005218084f670b6406d276e58688523e7b10d9b0f

    • SHA512

      fb9c29d1126eb8e940ceca0f49142840aec14ba2b3bfae7427f92ddfbfccb8e5fd7de29869f3664c8666d5e40dd6b48d9d91ed7fcd05b7e7f59fc1572d711f04

    • SSDEEP

      1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2bCXuZH4gb4CEn9J4Zmcvp:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgu

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks