General

  • Target

    5a4f22eb0f076f94a729dab9f36c523ee63060e10a3222e7cc9d5d40e18e6825

  • Size

    110KB

  • Sample

    241120-q4ckhaskfr

  • MD5

    17930414c6d73cfd112a5a56b18fff41

  • SHA1

    3c861338632115d7f748299e4326d82ad25bd57d

  • SHA256

    5a4f22eb0f076f94a729dab9f36c523ee63060e10a3222e7cc9d5d40e18e6825

  • SHA512

    77332e2a14af9dd38a834af71b860587e995aaef7920fbc6ec457fdee1069004e2685c4f7591009350dca5e7b75f79d38a8cae16e6f9628125797634af3f3381

  • SSDEEP

    3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnx8:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVv

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://duvarkagitlarimodelleri.com/42hhp/gZXakh7/

xlm40.dropper

https://dolphinwavehavuzrobotu.com/wp-includes/RmCbvIKjjtlB3tabyPo/

xlm40.dropper

http://animalsandusfujairah.com/wp-admin/JWO58zeUOwSI/

Targets

    • Target

      5a4f22eb0f076f94a729dab9f36c523ee63060e10a3222e7cc9d5d40e18e6825

    • Size

      110KB

    • MD5

      17930414c6d73cfd112a5a56b18fff41

    • SHA1

      3c861338632115d7f748299e4326d82ad25bd57d

    • SHA256

      5a4f22eb0f076f94a729dab9f36c523ee63060e10a3222e7cc9d5d40e18e6825

    • SHA512

      77332e2a14af9dd38a834af71b860587e995aaef7920fbc6ec457fdee1069004e2685c4f7591009350dca5e7b75f79d38a8cae16e6f9628125797634af3f3381

    • SSDEEP

      3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnx8:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks