General

  • Target

    f3c37c05e86e18cbcecff825c789a1f28307942c8f6e8a391c978a43fe39a72f

  • Size

    71KB

  • Sample

    241120-wvh9ks1jgx

  • MD5

    db071053ba8a4d07167c6af34ff810d4

  • SHA1

    db09c39369885fd20f346b8c323b386e9b38a56c

  • SHA256

    f3c37c05e86e18cbcecff825c789a1f28307942c8f6e8a391c978a43fe39a72f

  • SHA512

    e246a59cbf6b81cc6568caf2fd6accdccc93b6c6375a4b000b2a56165f4ba5e179e9943add5e35038ba5b4a6bb59361d83c27b420743cce7b05854f1925e9ca2

  • SSDEEP

    1536:jhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+gT+hDcnTLiQrRTZws8EQ:lKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://sweetzone.co/js/XVK/

xlm40.dropper

https://tassa.mx/edos/1hHlIQO/

xlm40.dropper

http://assaref.ma/old_assaref/A2B3P/

Targets

    • Target

      f3c37c05e86e18cbcecff825c789a1f28307942c8f6e8a391c978a43fe39a72f

    • Size

      71KB

    • MD5

      db071053ba8a4d07167c6af34ff810d4

    • SHA1

      db09c39369885fd20f346b8c323b386e9b38a56c

    • SHA256

      f3c37c05e86e18cbcecff825c789a1f28307942c8f6e8a391c978a43fe39a72f

    • SHA512

      e246a59cbf6b81cc6568caf2fd6accdccc93b6c6375a4b000b2a56165f4ba5e179e9943add5e35038ba5b4a6bb59361d83c27b420743cce7b05854f1925e9ca2

    • SSDEEP

      1536:jhKpb8rGYrMPe3q7Q0XV5xtezE8vG8UM+gT+hDcnTLiQrRTZws8EQ:lKpb8rGYrMPe3q7Q0XV5xtezE8vG8UMK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks