General

  • Target

    62fab9c35ea8be9f22973fc904f2312508b86f78f8320d724847542dd2d558e4

  • Size

    91KB

  • Sample

    241120-refrasxqev

  • MD5

    af875caf5a0ef77a409eddc73498df81

  • SHA1

    09a3d4e2526a40fa140e6875e17c7bfd7ff17e4a

  • SHA256

    62fab9c35ea8be9f22973fc904f2312508b86f78f8320d724847542dd2d558e4

  • SHA512

    dbfec343ac03ad27e408fd778545901f1cbb0d71ead639d890eb777d729fe0ffff81d4e284386d7c799bc241138680005c5d3f87b237048ac27e7fcb9063f9e3

  • SSDEEP

    1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2bCXuZH4gb4CEn9J4ZKcvp:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgC

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bundlefilm.com/headers/lkfBH3Czw9CjEW07P2/

xlm40.dropper

http://camsanparke.net/wp-content/h2Ja5bwB03hnyfCb/

xlm40.dropper

http://royreid.co.uk/wp-content/dCwG/

xlm40.dropper

https://cs.com.sg/admin/a1lR5wu/

Targets

    • Target

      62fab9c35ea8be9f22973fc904f2312508b86f78f8320d724847542dd2d558e4

    • Size

      91KB

    • MD5

      af875caf5a0ef77a409eddc73498df81

    • SHA1

      09a3d4e2526a40fa140e6875e17c7bfd7ff17e4a

    • SHA256

      62fab9c35ea8be9f22973fc904f2312508b86f78f8320d724847542dd2d558e4

    • SHA512

      dbfec343ac03ad27e408fd778545901f1cbb0d71ead639d890eb777d729fe0ffff81d4e284386d7c799bc241138680005c5d3f87b237048ac27e7fcb9063f9e3

    • SSDEEP

      1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg2bCXuZH4gb4CEn9J4ZKcvp:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgC

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks