General

  • Target

    85cd94cab84c69403a6565e85c465d6c5f8fa3eade0abaed05d31e49047a6d5e

  • Size

    95KB

  • Sample

    241120-pwpz7axdrj

  • MD5

    09529adaaaa6220c5547523ce35cd12f

  • SHA1

    4e43a006e90a02f4c0e6c1c4380c2b91646c5cf5

  • SHA256

    85cd94cab84c69403a6565e85c465d6c5f8fa3eade0abaed05d31e49047a6d5e

  • SHA512

    e9b1ccefc4b71079229d48bba32a74161d120baf38c4849a51c4bb1f70e7b505e6ed52be750fb472af66e3de82036cc380319d7a025897ed3e089de92e50cd28

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJm8:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      85cd94cab84c69403a6565e85c465d6c5f8fa3eade0abaed05d31e49047a6d5e

    • Size

      95KB

    • MD5

      09529adaaaa6220c5547523ce35cd12f

    • SHA1

      4e43a006e90a02f4c0e6c1c4380c2b91646c5cf5

    • SHA256

      85cd94cab84c69403a6565e85c465d6c5f8fa3eade0abaed05d31e49047a6d5e

    • SHA512

      e9b1ccefc4b71079229d48bba32a74161d120baf38c4849a51c4bb1f70e7b505e6ed52be750fb472af66e3de82036cc380319d7a025897ed3e089de92e50cd28

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJm8:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks