General

  • Target

    a715bc2241ec31b1345082bd9d87cd1a156ef524ff49a07e787588d15c8e3055

  • Size

    96KB

  • Sample

    241120-prt4cawgje

  • MD5

    1966f08dea4abc45520f950e9e170786

  • SHA1

    c5e45d0078b84180262b6f353649b307e6acc7e9

  • SHA256

    a715bc2241ec31b1345082bd9d87cd1a156ef524ff49a07e787588d15c8e3055

  • SHA512

    6cb0e3a0ff0eadf2a697330c604063b53d89f84eddc6b00e083efb84b90fd851bc14b67a2a2df43a471ddbda3d47ea9046818c57497bd3187e78519a77f87dc2

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3d:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgl

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fisika.mipa.uns.ac.id/reseller/img/nRAvAgoY8Y/

xlm40.dropper

http://greycoconut.com/edm/71qUA/

xlm40.dropper

http://zonainformatica.es/tienda/XCHJmidSYTkE/

xlm40.dropper

http://balletmagazine.ro/wp-content/9VrMPV/

Targets

    • Target

      a715bc2241ec31b1345082bd9d87cd1a156ef524ff49a07e787588d15c8e3055

    • Size

      96KB

    • MD5

      1966f08dea4abc45520f950e9e170786

    • SHA1

      c5e45d0078b84180262b6f353649b307e6acc7e9

    • SHA256

      a715bc2241ec31b1345082bd9d87cd1a156ef524ff49a07e787588d15c8e3055

    • SHA512

      6cb0e3a0ff0eadf2a697330c604063b53d89f84eddc6b00e083efb84b90fd851bc14b67a2a2df43a471ddbda3d47ea9046818c57497bd3187e78519a77f87dc2

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3d:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgl

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks