General

  • Target

    6ce5e70839029f011653067522505741259f9a338f848aea5da71735c355e217

  • Size

    47KB

  • Sample

    241120-ra4bssyblk

  • MD5

    82d5fc4befacc3c1ae7a73acd70beb4f

  • SHA1

    c0e112ff116c92cf5f9273b62ed1173d0fdf0a37

  • SHA256

    6ce5e70839029f011653067522505741259f9a338f848aea5da71735c355e217

  • SHA512

    a699fa7c3fa327ed8433f62459eafa925f3f2a2ab3e18ef2f6620795d733f5f1573875e094cb3c2bd6983519b51297aafb9471d76811421107032535726d6ef6

  • SSDEEP

    768:yDM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JOiX6DGwUk7qHDSEuRZjiBp5D:y62tfQXi8vgLZkTOHkQT51Vp6AwPe8gR

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://eleselektromekanik.com/69Iq5Pwbd0/s/

xlm40.dropper

https://demo.icn.com.np/stories/Qk/

xlm40.dropper

http://demo34.ckg.hk/service/Atk7RQfUV673M/

xlm40.dropper

https://bitmovil.mx/css/TrgyPiTXy3/

xlm40.dropper

http://dupot.cz/tvhost/DUnMUvwZOhQs/

xlm40.dropper

http://focanainternet.com.br/erros/DepAK3p1Y/

Targets

    • Target

      6ce5e70839029f011653067522505741259f9a338f848aea5da71735c355e217

    • Size

      47KB

    • MD5

      82d5fc4befacc3c1ae7a73acd70beb4f

    • SHA1

      c0e112ff116c92cf5f9273b62ed1173d0fdf0a37

    • SHA256

      6ce5e70839029f011653067522505741259f9a338f848aea5da71735c355e217

    • SHA512

      a699fa7c3fa327ed8433f62459eafa925f3f2a2ab3e18ef2f6620795d733f5f1573875e094cb3c2bd6983519b51297aafb9471d76811421107032535726d6ef6

    • SSDEEP

      768:yDM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JOiX6DGwUk7qHDSEuRZjiBp5D:y62tfQXi8vgLZkTOHkQT51Vp6AwPe8gR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks