General

  • Target

    185f362ced180cfc3a087d813a09fefd348a532cb22b89b1bec6b54d413c4705

  • Size

    95KB

  • Sample

    241120-vrtqgavjhr

  • MD5

    86087edbfa81321676983f59913f891f

  • SHA1

    e79c751a55fad3a5977427a948ffac859a8252ba

  • SHA256

    185f362ced180cfc3a087d813a09fefd348a532cb22b89b1bec6b54d413c4705

  • SHA512

    d40fe1639763830ba8307b12b12c78e8263cf20de5563c3b59fcceac0a85b645871f4989a7aa04a43b5a142e96e7ce0e3cb2533d61658452340ed08a74e8807f

  • SSDEEP

    1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgPHuS4hcTO97v7UYdEJmXNTE:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgh

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://aysbody.com/catalog/Oax5/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/QVvdNIasGj/

xlm40.dropper

https://yoymanajemen.id/wp-content/khXBxIm5/

xlm40.dropper

https://dawtona.dev.goldensystem.pl/wp-admin/EX05554XhKk3ee2cQ/

Targets

    • Target

      185f362ced180cfc3a087d813a09fefd348a532cb22b89b1bec6b54d413c4705

    • Size

      95KB

    • MD5

      86087edbfa81321676983f59913f891f

    • SHA1

      e79c751a55fad3a5977427a948ffac859a8252ba

    • SHA256

      185f362ced180cfc3a087d813a09fefd348a532cb22b89b1bec6b54d413c4705

    • SHA512

      d40fe1639763830ba8307b12b12c78e8263cf20de5563c3b59fcceac0a85b645871f4989a7aa04a43b5a142e96e7ce0e3cb2533d61658452340ed08a74e8807f

    • SSDEEP

      1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgPHuS4hcTO97v7UYdEJmXNTE:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgh

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks