General

  • Target

    d45b8e601d68f028ed96dc1d1873ecc18dca7bc753aadec38d6e0ad902eeb915

  • Size

    95KB

  • Sample

    241120-tave1aydnb

  • MD5

    05f59b5fe342d77f432eb4baacf78a41

  • SHA1

    81a360dec37b9c059bd49dd64b683631994c7a32

  • SHA256

    d45b8e601d68f028ed96dc1d1873ecc18dca7bc753aadec38d6e0ad902eeb915

  • SHA512

    3f2cf807c1de269c7c3dc6a4941639e2356adb759dd332b6b7e308c60a63f4ef2fd1bff32a6aba62b0f9ad9bbe6d2155361f4554532de3c2e1ad14a8267fbcc2

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmK:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      d45b8e601d68f028ed96dc1d1873ecc18dca7bc753aadec38d6e0ad902eeb915

    • Size

      95KB

    • MD5

      05f59b5fe342d77f432eb4baacf78a41

    • SHA1

      81a360dec37b9c059bd49dd64b683631994c7a32

    • SHA256

      d45b8e601d68f028ed96dc1d1873ecc18dca7bc753aadec38d6e0ad902eeb915

    • SHA512

      3f2cf807c1de269c7c3dc6a4941639e2356adb759dd332b6b7e308c60a63f4ef2fd1bff32a6aba62b0f9ad9bbe6d2155361f4554532de3c2e1ad14a8267fbcc2

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmK:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks