General

  • Target

    92e732f252583c1e2826d43b6017590a8924ca706ecca93a1138f97fadcf95d0

  • Size

    94KB

  • Sample

    241120-vn28fazhpl

  • MD5

    6aadaf40ff9218258f04eb9ef28d1514

  • SHA1

    cc7b3151503d64ecded57dbad6970aaffc97cca0

  • SHA256

    92e732f252583c1e2826d43b6017590a8924ca706ecca93a1138f97fadcf95d0

  • SHA512

    620ab794f0c086620fad556c6b36b6d84a1a57225bd83f4311093fc26830d74cc088a7e2afdcac52ca762a254629bedc220ee62688aab9810d27f1217acaeb57

  • SSDEEP

    1536:JsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgSUZx6FyxC3YGbl7BgWDFsqtNhWmDJdW5:6Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgR

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://bosny.com/aspnet_client/NGTx1FUzq/

xlm40.dropper

https://www.berekethaber.com/hatax/c7crGdejW4380ORuxqR/

xlm40.dropper

https://bulldogironworksllc.com/temp/BBh5HHpei/

Targets

    • Target

      92e732f252583c1e2826d43b6017590a8924ca706ecca93a1138f97fadcf95d0

    • Size

      94KB

    • MD5

      6aadaf40ff9218258f04eb9ef28d1514

    • SHA1

      cc7b3151503d64ecded57dbad6970aaffc97cca0

    • SHA256

      92e732f252583c1e2826d43b6017590a8924ca706ecca93a1138f97fadcf95d0

    • SHA512

      620ab794f0c086620fad556c6b36b6d84a1a57225bd83f4311093fc26830d74cc088a7e2afdcac52ca762a254629bedc220ee62688aab9810d27f1217acaeb57

    • SSDEEP

      1536:JsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgSUZx6FyxC3YGbl7BgWDFsqtNhWmDJdW5:6Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks