General

  • Target

    6fbb3ca83d459193e89f15c35718d9648c3c25854fd47cb428d555571f0d81c0

  • Size

    96KB

  • Sample

    241120-r982bsyfnn

  • MD5

    919197986df47ed0b14b6e54cfa22072

  • SHA1

    8e85df055c0edc3a3a36361237c8dd549376e922

  • SHA256

    6fbb3ca83d459193e89f15c35718d9648c3c25854fd47cb428d555571f0d81c0

  • SHA512

    0bd4a178ab1e1e7c7eb1aa0e849c4775c2a03fdea2fae4a79b737383cea2371e61c0c1dbb0b4e21aa48ea3cc3b670e035062f5dcf83881454c6ec40936de03f4

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2HuS4hcTO97v7UYdEJmA:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgs

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://atperson.com/campusvirtual/EOgFGo17w/

xlm40.dropper

https://eliteturismo.com/phpmailer-old/dafdBxQONtk5Uf9dxll/

xlm40.dropper

http://atici.net/c/JDFDBMIz/

xlm40.dropper

http://domesticuif.co.za/libraries/nbnH9dpd/

Targets

    • Target

      6fbb3ca83d459193e89f15c35718d9648c3c25854fd47cb428d555571f0d81c0

    • Size

      96KB

    • MD5

      919197986df47ed0b14b6e54cfa22072

    • SHA1

      8e85df055c0edc3a3a36361237c8dd549376e922

    • SHA256

      6fbb3ca83d459193e89f15c35718d9648c3c25854fd47cb428d555571f0d81c0

    • SHA512

      0bd4a178ab1e1e7c7eb1aa0e849c4775c2a03fdea2fae4a79b737383cea2371e61c0c1dbb0b4e21aa48ea3cc3b670e035062f5dcf83881454c6ec40936de03f4

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2HuS4hcTO97v7UYdEJmA:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgs

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks