General

  • Target

    93bfbba32de98342358e76544bb25c76507319e6a51a27377e43e9de002a85fb

  • Size

    91KB

  • Sample

    241120-vdfxfstrbj

  • MD5

    d0e96304f7cd2aac797b35ad4df92fa6

  • SHA1

    6aed63983a6c31cf90e4a1b090f4b9c869aa1f2c

  • SHA256

    93bfbba32de98342358e76544bb25c76507319e6a51a27377e43e9de002a85fb

  • SHA512

    7a233ca08f902bb47ead9c5b43127c0761518ede1b26101cf555e64787f083a22d62fbc00549c4c66303ecdf78c06e0dc9e16725cad57cc8e31b436ec2df27ec

  • SSDEEP

    1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgMbCXuZH4gb4CEn9J4ZSX3O:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://encuadernacionesartis.com/Vk2Z1Na/IZpyySkbU/

xlm40.dropper

http://eznetb.synology.me/@eaDir/E36Y/

xlm40.dropper

http://bytesendesign.nl/cgi-bin/LolX/

xlm40.dropper

http://choltice.eu/mwc/syl3Y/

Targets

    • Target

      93bfbba32de98342358e76544bb25c76507319e6a51a27377e43e9de002a85fb

    • Size

      91KB

    • MD5

      d0e96304f7cd2aac797b35ad4df92fa6

    • SHA1

      6aed63983a6c31cf90e4a1b090f4b9c869aa1f2c

    • SHA256

      93bfbba32de98342358e76544bb25c76507319e6a51a27377e43e9de002a85fb

    • SHA512

      7a233ca08f902bb47ead9c5b43127c0761518ede1b26101cf555e64787f083a22d62fbc00549c4c66303ecdf78c06e0dc9e16725cad57cc8e31b436ec2df27ec

    • SSDEEP

      1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgMbCXuZH4gb4CEn9J4ZSX3O:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks