General

  • Target

    790a60372bbcb712d6a252939ddcaa6f479a0b8ea9348a6c6c8ec64fba4bb81b

  • Size

    95KB

  • Sample

    241120-w6e2as1hkn

  • MD5

    50d0d464bffe9f006e58ad23faeef6a0

  • SHA1

    8a150f1f8e5508353752fb1a2b106ce8968c8649

  • SHA256

    790a60372bbcb712d6a252939ddcaa6f479a0b8ea9348a6c6c8ec64fba4bb81b

  • SHA512

    02af419a6d7503db83a62cbbe8d3a1c0682c9612cb6d6f3f376ce364f960b6f1e35fd51c1f3e3c79828204f7cc584041279228473b2d93dbced691b05275b45a

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCQ+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://francite.net/images/XI7zS0X1nY/

xlm40.dropper

https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/

xlm40.dropper

http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/

Targets

    • Target

      790a60372bbcb712d6a252939ddcaa6f479a0b8ea9348a6c6c8ec64fba4bb81b

    • Size

      95KB

    • MD5

      50d0d464bffe9f006e58ad23faeef6a0

    • SHA1

      8a150f1f8e5508353752fb1a2b106ce8968c8649

    • SHA256

      790a60372bbcb712d6a252939ddcaa6f479a0b8ea9348a6c6c8ec64fba4bb81b

    • SHA512

      02af419a6d7503db83a62cbbe8d3a1c0682c9612cb6d6f3f376ce364f960b6f1e35fd51c1f3e3c79828204f7cc584041279228473b2d93dbced691b05275b45a

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCQ+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks