General

  • Target

    c22b5278d4e30c0361fadf7f682514572b53644b7ca632d2e0bec4359ff9e139

  • Size

    95KB

  • Sample

    241120-nlvx1swmds

  • MD5

    3230801cedd3338f55af24add48e2cd5

  • SHA1

    9c9770d4e4bddda2134189c21a472151d66d5577

  • SHA256

    c22b5278d4e30c0361fadf7f682514572b53644b7ca632d2e0bec4359ff9e139

  • SHA512

    cccd040e4e1c88cc98e0ff5ea95053b735eb68a00ddb6d59fdcb567a989a1a7396283c6e00ed678c3049e58608df42a91f137c646d00d23728b0476dabfe6aff

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJms:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      c22b5278d4e30c0361fadf7f682514572b53644b7ca632d2e0bec4359ff9e139

    • Size

      95KB

    • MD5

      3230801cedd3338f55af24add48e2cd5

    • SHA1

      9c9770d4e4bddda2134189c21a472151d66d5577

    • SHA256

      c22b5278d4e30c0361fadf7f682514572b53644b7ca632d2e0bec4359ff9e139

    • SHA512

      cccd040e4e1c88cc98e0ff5ea95053b735eb68a00ddb6d59fdcb567a989a1a7396283c6e00ed678c3049e58608df42a91f137c646d00d23728b0476dabfe6aff

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJms:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks