General

  • Target

    89f48c712b7ae2007b97938dceb8fb3a2936b5b3071ee92c09129bc1fcb51a49

  • Size

    243KB

  • Sample

    241120-scv9msxhpf

  • MD5

    ddf396eb56ea8e96ab039f34425227cf

  • SHA1

    6eb153a3be69c9e150bfebe307e60ca505df6462

  • SHA256

    89f48c712b7ae2007b97938dceb8fb3a2936b5b3071ee92c09129bc1fcb51a49

  • SHA512

    fa404e5854285af26b136861967dc68569d049591dff1d40c3b2ba17bdda187ed3032ce2da649a34ce991bbaabdc9abb83bacc5f41457b5dd4b919ba8c90b8c0

  • SSDEEP

    6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/04:ghEXs5fXR8rsNz

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://servidorcarlosydavid.es/wp-admin/jkNPgHxNjF/

xlm40.dropper

https://gmo-sol-p10.heteml.jp/includes/UoJMgYAc1EES/

xlm40.dropper

https://iashanghai.cn/z/Z1PG6ulBh20plss/

xlm40.dropper

https://www.pasionportufuturo.pe/wp-content/HkUfvw0xuCy5/

xlm40.dropper

http://dmdagents.com.au/vqwbgz/CL4Bo4C4VS0deg/

Targets

    • Target

      89f48c712b7ae2007b97938dceb8fb3a2936b5b3071ee92c09129bc1fcb51a49

    • Size

      243KB

    • MD5

      ddf396eb56ea8e96ab039f34425227cf

    • SHA1

      6eb153a3be69c9e150bfebe307e60ca505df6462

    • SHA256

      89f48c712b7ae2007b97938dceb8fb3a2936b5b3071ee92c09129bc1fcb51a49

    • SHA512

      fa404e5854285af26b136861967dc68569d049591dff1d40c3b2ba17bdda187ed3032ce2da649a34ce991bbaabdc9abb83bacc5f41457b5dd4b919ba8c90b8c0

    • SSDEEP

      6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/04:ghEXs5fXR8rsNz

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks