General

  • Target

    9ba033f8964128d684c22c746e4e8780ddc7e8d488cc143683f1e80b07f18f8f

  • Size

    243KB

  • Sample

    241120-thkkrsyena

  • MD5

    8ad81935a05918552416d1f58ada9c23

  • SHA1

    100ed2dd6ae65cfb932622176b81753cbc305942

  • SHA256

    9ba033f8964128d684c22c746e4e8780ddc7e8d488cc143683f1e80b07f18f8f

  • SHA512

    42552aa90de204750610acd539584d7dd817d687ca135550171748cb5fbd949044b2ca9c44f671c39d51d866e086153b55ce3954a9566ddae1be99b99289025c

  • SSDEEP

    6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/0M:ghEXs5fXR8rsNf

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://servidorcarlosydavid.es/wp-admin/jkNPgHxNjF/

xlm40.dropper

https://gmo-sol-p10.heteml.jp/includes/UoJMgYAc1EES/

xlm40.dropper

https://iashanghai.cn/z/Z1PG6ulBh20plss/

xlm40.dropper

https://www.pasionportufuturo.pe/wp-content/HkUfvw0xuCy5/

xlm40.dropper

http://dmdagents.com.au/vqwbgz/CL4Bo4C4VS0deg/

Targets

    • Target

      9ba033f8964128d684c22c746e4e8780ddc7e8d488cc143683f1e80b07f18f8f

    • Size

      243KB

    • MD5

      8ad81935a05918552416d1f58ada9c23

    • SHA1

      100ed2dd6ae65cfb932622176b81753cbc305942

    • SHA256

      9ba033f8964128d684c22c746e4e8780ddc7e8d488cc143683f1e80b07f18f8f

    • SHA512

      42552aa90de204750610acd539584d7dd817d687ca135550171748cb5fbd949044b2ca9c44f671c39d51d866e086153b55ce3954a9566ddae1be99b99289025c

    • SSDEEP

      6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/0M:ghEXs5fXR8rsNf

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks