General

  • Target

    01cf5262ed684549a9eab7a6526d3d6aba1729481cad1bb2deff1321d2f61951

  • Size

    95KB

  • Sample

    241120-vb8vfszglp

  • MD5

    402a80ce54022afc8cee07237f7eceb4

  • SHA1

    9a1b55bf556c06b139af85e68888a97c4044fb50

  • SHA256

    01cf5262ed684549a9eab7a6526d3d6aba1729481cad1bb2deff1321d2f61951

  • SHA512

    d2324b0bf2879a50c7d12acb86fdde024fdbf3c242fd1e3d8c4c9d8c1127b1c4b5104ef8c84aea78b36f9f191b0a55b738eab4fee90af30790859103d13e41e4

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYHuS4hcTO97v7UYdEJmFB2:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://educacionsanvicentefundacion.com/iplookup/wYEInbaN/

xlm40.dropper

https://www.4monkeys.com/wp-admin/dNAuBEKo/

xlm40.dropper

http://haircutbar.com/cgi-bin/dNfEA5F/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/T0J9THbd5f2/

Targets

    • Target

      01cf5262ed684549a9eab7a6526d3d6aba1729481cad1bb2deff1321d2f61951

    • Size

      95KB

    • MD5

      402a80ce54022afc8cee07237f7eceb4

    • SHA1

      9a1b55bf556c06b139af85e68888a97c4044fb50

    • SHA256

      01cf5262ed684549a9eab7a6526d3d6aba1729481cad1bb2deff1321d2f61951

    • SHA512

      d2324b0bf2879a50c7d12acb86fdde024fdbf3c242fd1e3d8c4c9d8c1127b1c4b5104ef8c84aea78b36f9f191b0a55b738eab4fee90af30790859103d13e41e4

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYHuS4hcTO97v7UYdEJmFB2:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks