General

  • Target

    4f495c85863e638204114e72143b140cd3ac4386140bfb5d730deeb20b5c46f5

  • Size

    96KB

  • Sample

    241120-wqklvazfrd

  • MD5

    e001712dd55e1b63b2789df03cac150c

  • SHA1

    7339e829f3f4d0eab5cb4538fc87d7fbd26291f7

  • SHA256

    4f495c85863e638204114e72143b140cd3ac4386140bfb5d730deeb20b5c46f5

  • SHA512

    3d0c3d9638711d7b791f501670368472b1de554f8508828fd96e0a65de2f26d0dcce06d027fd182bd2361f4f209ff7a297d0d5bf8ff471bf82ac4ba59c072765

  • SSDEEP

    1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmi7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgs

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://bpsjambi.id/about/CcN5IbuInPQ/

xlm40.dropper

https://greenlizard.co.za/amanah/pu8xeUOpqqq/

xlm40.dropper

https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/

xlm40.dropper

https://www.yell.ge/nav_logo/x960wo3PHaIUm/

Targets

    • Target

      4f495c85863e638204114e72143b140cd3ac4386140bfb5d730deeb20b5c46f5

    • Size

      96KB

    • MD5

      e001712dd55e1b63b2789df03cac150c

    • SHA1

      7339e829f3f4d0eab5cb4538fc87d7fbd26291f7

    • SHA256

      4f495c85863e638204114e72143b140cd3ac4386140bfb5d730deeb20b5c46f5

    • SHA512

      3d0c3d9638711d7b791f501670368472b1de554f8508828fd96e0a65de2f26d0dcce06d027fd182bd2361f4f209ff7a297d0d5bf8ff471bf82ac4ba59c072765

    • SSDEEP

      1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJmi7:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgs

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks