General

  • Target

    e2f09fb7f5eb3bbf72cd13981454329d5cab5dc117236901f4c402ca39af947e

  • Size

    95KB

  • Sample

    241120-sxy62aybqe

  • MD5

    cfced6babeacb2e954002d30c762a0cc

  • SHA1

    99ada5acbada547e2f5881bbe467320ad133818c

  • SHA256

    e2f09fb7f5eb3bbf72cd13981454329d5cab5dc117236901f4c402ca39af947e

  • SHA512

    b862349fb87731c92e39908806e9a946aee0d625848cfe9bcf93c563bb04e82dafe51e3ddb108ba1db5388f2a115fd3cf162f233a941d4e53e02cced2b40c71d

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCg+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgq

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://francite.net/images/XI7zS0X1nY/

xlm40.dropper

https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/

xlm40.dropper

http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/

Targets

    • Target

      e2f09fb7f5eb3bbf72cd13981454329d5cab5dc117236901f4c402ca39af947e

    • Size

      95KB

    • MD5

      cfced6babeacb2e954002d30c762a0cc

    • SHA1

      99ada5acbada547e2f5881bbe467320ad133818c

    • SHA256

      e2f09fb7f5eb3bbf72cd13981454329d5cab5dc117236901f4c402ca39af947e

    • SHA512

      b862349fb87731c92e39908806e9a946aee0d625848cfe9bcf93c563bb04e82dafe51e3ddb108ba1db5388f2a115fd3cf162f233a941d4e53e02cced2b40c71d

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCg+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks