General

  • Target

    94751ff27798bb6235436a9311a887ef41b0831c12c154684f96555ce1da1194

  • Size

    96KB

  • Sample

    241120-v1svjaznhv

  • MD5

    55a1a67edba090bd34057efd0d99a0b5

  • SHA1

    e7e802e34296594f5487724bbf80ed2536925763

  • SHA256

    94751ff27798bb6235436a9311a887ef41b0831c12c154684f96555ce1da1194

  • SHA512

    7f5ccdf93e01ad7bc066b760a632244026247def4f5df65a42372cbcba8d08fc3ec0acdc06d4fa9578c8481cfa1d14c6adf2d35a2f34e85829c019598089f3ce

  • SSDEEP

    1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmX7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgl

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://bpsjambi.id/about/CcN5IbuInPQ/

xlm40.dropper

https://greenlizard.co.za/amanah/pu8xeUOpqqq/

xlm40.dropper

https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/

xlm40.dropper

https://www.yell.ge/nav_logo/x960wo3PHaIUm/

Targets

    • Target

      94751ff27798bb6235436a9311a887ef41b0831c12c154684f96555ce1da1194

    • Size

      96KB

    • MD5

      55a1a67edba090bd34057efd0d99a0b5

    • SHA1

      e7e802e34296594f5487724bbf80ed2536925763

    • SHA256

      94751ff27798bb6235436a9311a887ef41b0831c12c154684f96555ce1da1194

    • SHA512

      7f5ccdf93e01ad7bc066b760a632244026247def4f5df65a42372cbcba8d08fc3ec0acdc06d4fa9578c8481cfa1d14c6adf2d35a2f34e85829c019598089f3ce

    • SSDEEP

      1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmX7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgl

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks