General

  • Target

    38be02efc1373dda52df4f9c25f666616dbd39caca0d223cd62432a049276d00

  • Size

    56KB

  • Sample

    241120-tvl95azjav

  • MD5

    f0483b2879457d7f77884f7e6d2d3701

  • SHA1

    30f48e3607beaa33546522b8e88b1f52f6d9bcd3

  • SHA256

    38be02efc1373dda52df4f9c25f666616dbd39caca0d223cd62432a049276d00

  • SHA512

    1945c2450555c32b2c4589a609afb9ce254bb8b7d3c3fedec89a297525ab24e4110884a726aa36fc80dcd57cdb094880999e8bbe73ba0da6e5eaea24da7b271a

  • SSDEEP

    1536:yUsgWy4WV8cPkkhN+8ZvOVWoNwlQolOko3t0F5uVAwk6:9snbcpn+8ZGIFK73tMQ5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.equus.com/2i8yt/GhBSz6peG/

Targets

    • Target

      38be02efc1373dda52df4f9c25f666616dbd39caca0d223cd62432a049276d00

    • Size

      56KB

    • MD5

      f0483b2879457d7f77884f7e6d2d3701

    • SHA1

      30f48e3607beaa33546522b8e88b1f52f6d9bcd3

    • SHA256

      38be02efc1373dda52df4f9c25f666616dbd39caca0d223cd62432a049276d00

    • SHA512

      1945c2450555c32b2c4589a609afb9ce254bb8b7d3c3fedec89a297525ab24e4110884a726aa36fc80dcd57cdb094880999e8bbe73ba0da6e5eaea24da7b271a

    • SSDEEP

      1536:yUsgWy4WV8cPkkhN+8ZvOVWoNwlQolOko3t0F5uVAwk6:9snbcpn+8ZGIFK73tMQ5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks