General

  • Target

    72614432199e84b1b9772489870af487fb73ff5dcedf07aa58c235ff7c8d6856

  • Size

    96KB

  • Sample

    241120-w1m5qa1glk

  • MD5

    f3d3d6bbb2e8f9fcb74807d57b6c41a0

  • SHA1

    fb3b2845d7dad7f8b3a995e059445fbf4f7e76ae

  • SHA256

    72614432199e84b1b9772489870af487fb73ff5dcedf07aa58c235ff7c8d6856

  • SHA512

    38e220a0d63ca2fc08a2868a520b48ac1e2245eff2a02442139fe563d6153cfa6ce9f1be802d74df1ac9f1d3f45badcce9e1c957456c4cf5e80aa100b5455c8d

  • SSDEEP

    1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3x:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgZ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fisika.mipa.uns.ac.id/reseller/img/nRAvAgoY8Y/

xlm40.dropper

http://greycoconut.com/edm/71qUA/

xlm40.dropper

http://zonainformatica.es/tienda/XCHJmidSYTkE/

xlm40.dropper

http://balletmagazine.ro/wp-content/9VrMPV/

Targets

    • Target

      72614432199e84b1b9772489870af487fb73ff5dcedf07aa58c235ff7c8d6856

    • Size

      96KB

    • MD5

      f3d3d6bbb2e8f9fcb74807d57b6c41a0

    • SHA1

      fb3b2845d7dad7f8b3a995e059445fbf4f7e76ae

    • SHA256

      72614432199e84b1b9772489870af487fb73ff5dcedf07aa58c235ff7c8d6856

    • SHA512

      38e220a0d63ca2fc08a2868a520b48ac1e2245eff2a02442139fe563d6153cfa6ce9f1be802d74df1ac9f1d3f45badcce9e1c957456c4cf5e80aa100b5455c8d

    • SSDEEP

      1536:7kKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4jHuS4hcTO97v7UYdEJm3x:IKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgZ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks