General

  • Target

    dd1e50574c9ed2ac6abb758f7101a9eac40d73ebed878833370250c16f3d4906

  • Size

    96KB

  • Sample

    241120-ty96csygnb

  • MD5

    4bc22ac9fde974adbcea99e3dd4d7920

  • SHA1

    4ff878a5734b556e537f6248ff2ace36f5d830be

  • SHA256

    dd1e50574c9ed2ac6abb758f7101a9eac40d73ebed878833370250c16f3d4906

  • SHA512

    1e0c0b9a46bcd182397b42e132bedb7a851d3b4d1e2233d8c07b754aacc24f80f8f831bb83cc432af13178459a58c88c0e54164799f1a263814bedf86946dc91

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3i:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fisika.mipa.uns.ac.id/reseller/img/nRAvAgoY8Y/

xlm40.dropper

http://greycoconut.com/edm/71qUA/

xlm40.dropper

http://zonainformatica.es/tienda/XCHJmidSYTkE/

xlm40.dropper

http://balletmagazine.ro/wp-content/9VrMPV/

Targets

    • Target

      dd1e50574c9ed2ac6abb758f7101a9eac40d73ebed878833370250c16f3d4906

    • Size

      96KB

    • MD5

      4bc22ac9fde974adbcea99e3dd4d7920

    • SHA1

      4ff878a5734b556e537f6248ff2ace36f5d830be

    • SHA256

      dd1e50574c9ed2ac6abb758f7101a9eac40d73ebed878833370250c16f3d4906

    • SHA512

      1e0c0b9a46bcd182397b42e132bedb7a851d3b4d1e2233d8c07b754aacc24f80f8f831bb83cc432af13178459a58c88c0e54164799f1a263814bedf86946dc91

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3i:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks