General

  • Target

    69d0733f442f709f71568292fa99d52ccfee7c60da2f56ce481657a0b30a3cb9

  • Size

    110KB

  • Sample

    241120-tgvdkszdjl

  • MD5

    9872a14d371b07c7bc59b3858d66bf68

  • SHA1

    9a119e98ef85cd8da2ef7bc91d506e698d1e8626

  • SHA256

    69d0733f442f709f71568292fa99d52ccfee7c60da2f56ce481657a0b30a3cb9

  • SHA512

    4b2e143196b7545087174d2b8f29a8ce0a98b51934ec4faf61a9fb6fdd3fd7706e9ae5a7266cf54312f9c7c75f24e701d9db4cea766d5f1bdeb70699ac48d638

  • SSDEEP

    3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnxc:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://duvarkagitlarimodelleri.com/42hhp/gZXakh7/

xlm40.dropper

https://dolphinwavehavuzrobotu.com/wp-includes/RmCbvIKjjtlB3tabyPo/

xlm40.dropper

http://animalsandusfujairah.com/wp-admin/JWO58zeUOwSI/

Targets

    • Target

      69d0733f442f709f71568292fa99d52ccfee7c60da2f56ce481657a0b30a3cb9

    • Size

      110KB

    • MD5

      9872a14d371b07c7bc59b3858d66bf68

    • SHA1

      9a119e98ef85cd8da2ef7bc91d506e698d1e8626

    • SHA256

      69d0733f442f709f71568292fa99d52ccfee7c60da2f56ce481657a0b30a3cb9

    • SHA512

      4b2e143196b7545087174d2b8f29a8ce0a98b51934ec4faf61a9fb6fdd3fd7706e9ae5a7266cf54312f9c7c75f24e701d9db4cea766d5f1bdeb70699ac48d638

    • SSDEEP

      3072:VfKpbdrHYrMue8q7QPX+5xtekEdi8/dgVyVIBk6h2bsllScQjnxc:pKpbdrHYrMue8q7QPX+5xtFEdi8/dgVP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks