General

  • Target

    77d176e128ed8c117fb14354b95cd8dea03498eba8250f159f702f54ed05eb0f

  • Size

    95KB

  • Sample

    241120-pc7qwsxbpm

  • MD5

    435d7619269af45a15ae30d821bfb933

  • SHA1

    00217d149b19da0b6730eecee5b1f6d9391669f1

  • SHA256

    77d176e128ed8c117fb14354b95cd8dea03498eba8250f159f702f54ed05eb0f

  • SHA512

    688738b49df8dbc5d9b57ad3dcdb5212039e498190d7902d885480f220d547c43566edd243fcdcd7aa71615072adac014e220ae3b3ff9101e820875a9e56fc2f

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm5:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      77d176e128ed8c117fb14354b95cd8dea03498eba8250f159f702f54ed05eb0f

    • Size

      95KB

    • MD5

      435d7619269af45a15ae30d821bfb933

    • SHA1

      00217d149b19da0b6730eecee5b1f6d9391669f1

    • SHA256

      77d176e128ed8c117fb14354b95cd8dea03498eba8250f159f702f54ed05eb0f

    • SHA512

      688738b49df8dbc5d9b57ad3dcdb5212039e498190d7902d885480f220d547c43566edd243fcdcd7aa71615072adac014e220ae3b3ff9101e820875a9e56fc2f

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm5:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks