General

  • Target

    5bda1cdfe1f243f72df03e8870fac241dd53c6c7d134a63bd904408a6da5eb6c

  • Size

    95KB

  • Sample

    241120-wa3sgszqc1

  • MD5

    a22969b981a50542b1c30ce89f88216c

  • SHA1

    32480211741054bb5c5e80200f4d4cf2540a16c2

  • SHA256

    5bda1cdfe1f243f72df03e8870fac241dd53c6c7d134a63bd904408a6da5eb6c

  • SHA512

    0d14480335ba04a4af7e1320ee3ad370ecb9e39686291055c091afddee61ac9e3e5ac660ddbc7d8c00ebedf205ef7419b2eff745ed39b0a2c9108d46cfa95505

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJms:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      5bda1cdfe1f243f72df03e8870fac241dd53c6c7d134a63bd904408a6da5eb6c

    • Size

      95KB

    • MD5

      a22969b981a50542b1c30ce89f88216c

    • SHA1

      32480211741054bb5c5e80200f4d4cf2540a16c2

    • SHA256

      5bda1cdfe1f243f72df03e8870fac241dd53c6c7d134a63bd904408a6da5eb6c

    • SHA512

      0d14480335ba04a4af7e1320ee3ad370ecb9e39686291055c091afddee61ac9e3e5ac660ddbc7d8c00ebedf205ef7419b2eff745ed39b0a2c9108d46cfa95505

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJms:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks