General

  • Target

    bb15fbc1ee0642e8b2a2e8c28302fda70e963e04de777510f1570fb2731fabb4

  • Size

    56KB

  • Sample

    241120-tf394ayela

  • MD5

    de65c1424ae799019aac5992fac40635

  • SHA1

    a445fec3cf93835b0f6890a3281e84a3a3d15e96

  • SHA256

    bb15fbc1ee0642e8b2a2e8c28302fda70e963e04de777510f1570fb2731fabb4

  • SHA512

    04f5ded2975b38f2595652d027c1e2f7f15976ad4e1d00daa1cbb087456e139c8addb195c604d47f07180ee16699a824a194a86b6c88ee659cffea3b1c57084f

  • SSDEEP

    1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg/5G9XSZ4umv/:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgs

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://church.ktc-center.net/PbSkdCOW/

xlm40.dropper

https://chobemaster.com/components/gus/

xlm40.dropper

https://christianchapman.com/cgi-bin/gADHL9UXSFUTN/

Targets

    • Target

      bb15fbc1ee0642e8b2a2e8c28302fda70e963e04de777510f1570fb2731fabb4

    • Size

      56KB

    • MD5

      de65c1424ae799019aac5992fac40635

    • SHA1

      a445fec3cf93835b0f6890a3281e84a3a3d15e96

    • SHA256

      bb15fbc1ee0642e8b2a2e8c28302fda70e963e04de777510f1570fb2731fabb4

    • SHA512

      04f5ded2975b38f2595652d027c1e2f7f15976ad4e1d00daa1cbb087456e139c8addb195c604d47f07180ee16699a824a194a86b6c88ee659cffea3b1c57084f

    • SSDEEP

      1536:VsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg/5G9XSZ4umv/:aKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgs

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks