General

  • Target

    aa84075a08acb893f94c1a07690928be80c44b89d71358a655ac616f98efc6d2

  • Size

    96KB

  • Sample

    241120-pcv24a1lgl

  • MD5

    5863705df867220ecee91926ce9afc6d

  • SHA1

    8cf80f8009f4a1ee2afffeb106b929676df9ea41

  • SHA256

    aa84075a08acb893f94c1a07690928be80c44b89d71358a655ac616f98efc6d2

  • SHA512

    b3e8bdc3db6692f186501f9e5f23523ef23c956f192f464b0c3796c0c9f73836bff9231ccda4a0cf185ee35b0efa03b162d59cdcc85f7abcc474e14a4b99eb77

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3N:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgV

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fisika.mipa.uns.ac.id/reseller/img/nRAvAgoY8Y/

xlm40.dropper

http://greycoconut.com/edm/71qUA/

xlm40.dropper

http://zonainformatica.es/tienda/XCHJmidSYTkE/

xlm40.dropper

http://balletmagazine.ro/wp-content/9VrMPV/

Targets

    • Target

      aa84075a08acb893f94c1a07690928be80c44b89d71358a655ac616f98efc6d2

    • Size

      96KB

    • MD5

      5863705df867220ecee91926ce9afc6d

    • SHA1

      8cf80f8009f4a1ee2afffeb106b929676df9ea41

    • SHA256

      aa84075a08acb893f94c1a07690928be80c44b89d71358a655ac616f98efc6d2

    • SHA512

      b3e8bdc3db6692f186501f9e5f23523ef23c956f192f464b0c3796c0c9f73836bff9231ccda4a0cf185ee35b0efa03b162d59cdcc85f7abcc474e14a4b99eb77

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3N:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks