General

  • Target

    e61f3cb3513878eab639c412221959ad5a9e056bb47d6d730cb5b55ccd9152ae

  • Size

    95KB

  • Sample

    241120-q8g1saslbj

  • MD5

    a15567326f778883467e7dd7912d3f47

  • SHA1

    deb2cfa75421be6cfeb3f108005a00008cc6cf51

  • SHA256

    e61f3cb3513878eab639c412221959ad5a9e056bb47d6d730cb5b55ccd9152ae

  • SHA512

    f4e20dfa924e6817ab7d9a454ab09feab86c5c8a373414ac6dce714bea0094361b12f0ba8d1e46ac58546b1cafb7b050c6a9865a38230caf51f2133353d14907

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYHuS4hcTO97v7UYdEJmFx2:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://educacionsanvicentefundacion.com/iplookup/wYEInbaN/

xlm40.dropper

https://www.4monkeys.com/wp-admin/dNAuBEKo/

xlm40.dropper

http://haircutbar.com/cgi-bin/dNfEA5F/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/T0J9THbd5f2/

Targets

    • Target

      e61f3cb3513878eab639c412221959ad5a9e056bb47d6d730cb5b55ccd9152ae

    • Size

      95KB

    • MD5

      a15567326f778883467e7dd7912d3f47

    • SHA1

      deb2cfa75421be6cfeb3f108005a00008cc6cf51

    • SHA256

      e61f3cb3513878eab639c412221959ad5a9e056bb47d6d730cb5b55ccd9152ae

    • SHA512

      f4e20dfa924e6817ab7d9a454ab09feab86c5c8a373414ac6dce714bea0094361b12f0ba8d1e46ac58546b1cafb7b050c6a9865a38230caf51f2133353d14907

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYHuS4hcTO97v7UYdEJmFx2:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks