General

  • Target

    b98f9a34e6ee01c57cdd336163dd465f08605fa2418b4f84369a99f4edb678f4

  • Size

    95KB

  • Sample

    241120-sdznfsylew

  • MD5

    599928af337384764285d39e396be3ef

  • SHA1

    18ad03fcaf80c4bfcfb79b99ab9128ea9323cd0b

  • SHA256

    b98f9a34e6ee01c57cdd336163dd465f08605fa2418b4f84369a99f4edb678f4

  • SHA512

    e9409b70ba7c94ef4f1b649c6875249ab79278f81b79217329a8ffea454ece9bdaca7acf1dcc0374e1850ef08efdc6ead1137ff7efb59921d22fed4747346b9f

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgaHuS4hcTO97v7UYdEJmE:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://bpsjambi.id/about/5dDtahY1ewj/

xlm40.dropper

http://alsafwa.com.ly/webcal/E3Yx9UarfMuz6sk/

xlm40.dropper

http://galileuconcursos.com.br/wp-admin/iF9x/

xlm40.dropper

https://frascona.com.ar/assets/xobbA5VJIi/

Targets

    • Target

      b98f9a34e6ee01c57cdd336163dd465f08605fa2418b4f84369a99f4edb678f4

    • Size

      95KB

    • MD5

      599928af337384764285d39e396be3ef

    • SHA1

      18ad03fcaf80c4bfcfb79b99ab9128ea9323cd0b

    • SHA256

      b98f9a34e6ee01c57cdd336163dd465f08605fa2418b4f84369a99f4edb678f4

    • SHA512

      e9409b70ba7c94ef4f1b649c6875249ab79278f81b79217329a8ffea454ece9bdaca7acf1dcc0374e1850ef08efdc6ead1137ff7efb59921d22fed4747346b9f

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgaHuS4hcTO97v7UYdEJmE:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks