General

  • Target

    cbbc2acd553d9ca04cf47e7db4515d35e8d9a81c45127ff001837df3c22876d3

  • Size

    95KB

  • Sample

    241120-qjvkksxaqc

  • MD5

    8ef3e4bd2572faa78579424df940fcaa

  • SHA1

    055e91b1027e5924b6079d28d60b83e2986e0974

  • SHA256

    cbbc2acd553d9ca04cf47e7db4515d35e8d9a81c45127ff001837df3c22876d3

  • SHA512

    985a10e853d466fc71d2bd452933a03febeccc36d65f621bbcb26d2ee0d03ac4f5b739cb77aeaffbd1e5343807ef2c9c370f2865242800d29d62eb85a23267eb

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCs+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://francite.net/images/XI7zS0X1nY/

xlm40.dropper

https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/

xlm40.dropper

http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/

Targets

    • Target

      cbbc2acd553d9ca04cf47e7db4515d35e8d9a81c45127ff001837df3c22876d3

    • Size

      95KB

    • MD5

      8ef3e4bd2572faa78579424df940fcaa

    • SHA1

      055e91b1027e5924b6079d28d60b83e2986e0974

    • SHA256

      cbbc2acd553d9ca04cf47e7db4515d35e8d9a81c45127ff001837df3c22876d3

    • SHA512

      985a10e853d466fc71d2bd452933a03febeccc36d65f621bbcb26d2ee0d03ac4f5b739cb77aeaffbd1e5343807ef2c9c370f2865242800d29d62eb85a23267eb

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCs+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks