General

  • Target

    de28c22084a7268f4e420ae7b1ef91d35513448e3597c633eada8b687a2fcce7

  • Size

    95KB

  • Sample

    241120-vyzv3avkgq

  • MD5

    22105a69247a6391244614880ecf9388

  • SHA1

    48951ccd8364e0060fd1e264f448c0c62435ba04

  • SHA256

    de28c22084a7268f4e420ae7b1ef91d35513448e3597c633eada8b687a2fcce7

  • SHA512

    d31e35db89d31725fa94efe39c0debbf0969881680c18689273b7f338a7a7d27a4d4fb4fda80450c09b84483e2b28a0353bbd695389c55b6ff6d0a31d117c4da

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmJ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      de28c22084a7268f4e420ae7b1ef91d35513448e3597c633eada8b687a2fcce7

    • Size

      95KB

    • MD5

      22105a69247a6391244614880ecf9388

    • SHA1

      48951ccd8364e0060fd1e264f448c0c62435ba04

    • SHA256

      de28c22084a7268f4e420ae7b1ef91d35513448e3597c633eada8b687a2fcce7

    • SHA512

      d31e35db89d31725fa94efe39c0debbf0969881680c18689273b7f338a7a7d27a4d4fb4fda80450c09b84483e2b28a0353bbd695389c55b6ff6d0a31d117c4da

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmJ:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgk

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks