General

  • Target

    4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751

  • Size

    102KB

  • Sample

    241120-prwbeawrhy

  • MD5

    2e99b5266f0e8c18d6f467a91173f79f

  • SHA1

    5754d735aa4b2630224f825dd80aa0d08f5ec827

  • SHA256

    4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751

  • SHA512

    27eb43b1410c90c1fc80c4d396d23363827e0f4359cfc8dbfd59f36cd06b93b470f4fe20d16f31aa51c4927561003465aa3884fa10c93027e2a0ba9cebb4b9b4

  • SSDEEP

    1536:6HpqqHip20B+axURtKckrr9qZGrhD1GW+wZk4lHpuaI4qMCh:MBHiHHxutKckrpqZGh+wrlJuaIjV

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://luoicauthang.com/css/m6RaglUnYVXJ7mw2W/

Targets

    • Target

      4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751

    • Size

      102KB

    • MD5

      2e99b5266f0e8c18d6f467a91173f79f

    • SHA1

      5754d735aa4b2630224f825dd80aa0d08f5ec827

    • SHA256

      4b60f16267cccc012996728c348d161d8bf6fcfa0f4a0ec5e4ac7f66e4561751

    • SHA512

      27eb43b1410c90c1fc80c4d396d23363827e0f4359cfc8dbfd59f36cd06b93b470f4fe20d16f31aa51c4927561003465aa3884fa10c93027e2a0ba9cebb4b9b4

    • SSDEEP

      1536:6HpqqHip20B+axURtKckrr9qZGrhD1GW+wZk4lHpuaI4qMCh:MBHiHHxutKckrpqZGh+wrlJuaIjV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks