General

  • Target

    b0eada3841834f2f94f551bad8369de0376d0cf9150bd6c5c0afb1817a56f09e

  • Size

    71KB

  • Sample

    241120-vjprjstrgm

  • MD5

    944d2d14dbcaf0a85595b923dba2acf0

  • SHA1

    5dd557fa76c6da957e887d90d00f0c1c273a6225

  • SHA256

    b0eada3841834f2f94f551bad8369de0376d0cf9150bd6c5c0afb1817a56f09e

  • SHA512

    4377cf5b92eec550313c9c44c700bb7c0883a4564929b6b562167eb8613b846bedef042bc75c69be2f7d18a26e9a6f05f47a68880065d1bfc911719de07bce1a

  • SSDEEP

    1536:jhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+0+hDcnTLiQrRTZws8El:lKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMX

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://natayakim.com/personal/o0sKIzRjM/

xlm40.dropper

http://meta4media.com/portfolio2/flb3iuglypsbqT/

xlm40.dropper

http://hathaabeach.com/documents/zNsC/

Targets

    • Target

      b0eada3841834f2f94f551bad8369de0376d0cf9150bd6c5c0afb1817a56f09e

    • Size

      71KB

    • MD5

      944d2d14dbcaf0a85595b923dba2acf0

    • SHA1

      5dd557fa76c6da957e887d90d00f0c1c273a6225

    • SHA256

      b0eada3841834f2f94f551bad8369de0376d0cf9150bd6c5c0afb1817a56f09e

    • SHA512

      4377cf5b92eec550313c9c44c700bb7c0883a4564929b6b562167eb8613b846bedef042bc75c69be2f7d18a26e9a6f05f47a68880065d1bfc911719de07bce1a

    • SSDEEP

      1536:jhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+0+hDcnTLiQrRTZws8El:lKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMX

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks