General

  • Target

    cb8b1d3186aea20488f5a674db62355c595589b6af6ea9ea4e6851ecc0780766

  • Size

    95KB

  • Sample

    241120-tc67ksyqcw

  • MD5

    3cc1f02008d04009645307c0472c56f3

  • SHA1

    46641f908fede94fe4f1c939be488e7a4a372256

  • SHA256

    cb8b1d3186aea20488f5a674db62355c595589b6af6ea9ea4e6851ecc0780766

  • SHA512

    d4438f86116cb3580f0296ffb5019e824835974827239f9373747af9ee62ba84effaa5528bc64d5a5be9ee2d0c33d334e54ad57852f6582b7fbe76d72c07fc3b

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmA:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgO

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      cb8b1d3186aea20488f5a674db62355c595589b6af6ea9ea4e6851ecc0780766

    • Size

      95KB

    • MD5

      3cc1f02008d04009645307c0472c56f3

    • SHA1

      46641f908fede94fe4f1c939be488e7a4a372256

    • SHA256

      cb8b1d3186aea20488f5a674db62355c595589b6af6ea9ea4e6851ecc0780766

    • SHA512

      d4438f86116cb3580f0296ffb5019e824835974827239f9373747af9ee62ba84effaa5528bc64d5a5be9ee2d0c33d334e54ad57852f6582b7fbe76d72c07fc3b

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmA:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgO

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks