General

  • Target

    7c280fec65c7f99c3a85d44c03574d92bb0c2e32bc4fd0265fcdf19dd5f1f14c

  • Size

    53KB

  • Sample

    241120-tbc74stmcj

  • MD5

    192e8820909fc0fd8958cf6cfda9810c

  • SHA1

    d310a322d95637d835b33e684e3bf397fd4cb1cc

  • SHA256

    7c280fec65c7f99c3a85d44c03574d92bb0c2e32bc4fd0265fcdf19dd5f1f14c

  • SHA512

    3699eec9d8763b5a5f833587b8fdd71bcbdd685d8f4af454aa2a3fe26aed3e03925629bd6f4954599b072c753850a5a65bd39e61759730f0e2ea13b31f529cd6

  • SSDEEP

    1536:vcTKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgHpQvKr:v2Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://colordropsgu.com/7DORfidiAu/BquoSU/

xlm40.dropper

https://ewingconsulting.com/buy/Ewj7oYjhYQ/

xlm40.dropper

https://ceramicalafortaleza.com/css/5DSBCCH0/

xlm40.dropper

http://thuybaohuy.com/wp-content/VxhkYwH7/

Targets

    • Target

      7c280fec65c7f99c3a85d44c03574d92bb0c2e32bc4fd0265fcdf19dd5f1f14c

    • Size

      53KB

    • MD5

      192e8820909fc0fd8958cf6cfda9810c

    • SHA1

      d310a322d95637d835b33e684e3bf397fd4cb1cc

    • SHA256

      7c280fec65c7f99c3a85d44c03574d92bb0c2e32bc4fd0265fcdf19dd5f1f14c

    • SHA512

      3699eec9d8763b5a5f833587b8fdd71bcbdd685d8f4af454aa2a3fe26aed3e03925629bd6f4954599b072c753850a5a65bd39e61759730f0e2ea13b31f529cd6

    • SSDEEP

      1536:vcTKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgHpQvKr:v2Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks