General

  • Target

    85ba061146658f121029eb4395fdc48bd901b73be815ad3a1e76ce2471aa99b8

  • Size

    95KB

  • Sample

    241120-wvqcwszgme

  • MD5

    9668ccd5ae2ad4539fcf8c9181c667dd

  • SHA1

    0d46bbb56035d780ce4055e1d179c9c8dbe1c172

  • SHA256

    85ba061146658f121029eb4395fdc48bd901b73be815ad3a1e76ce2471aa99b8

  • SHA512

    fbcc7f0f7e62eb2a91e4eb34cce1ff6a946ba2f70556f9423fba0e1c9f3e8b858546499e317c872e2650d4ff9b744a6e5ec8e2f164632d98f1ff945ddba7c26b

  • SSDEEP

    1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgPHuS4hcTO97v7UYdEJmXN3E:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://aysbody.com/catalog/Oax5/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/QVvdNIasGj/

xlm40.dropper

https://yoymanajemen.id/wp-content/khXBxIm5/

xlm40.dropper

https://dawtona.dev.goldensystem.pl/wp-admin/EX05554XhKk3ee2cQ/

Targets

    • Target

      85ba061146658f121029eb4395fdc48bd901b73be815ad3a1e76ce2471aa99b8

    • Size

      95KB

    • MD5

      9668ccd5ae2ad4539fcf8c9181c667dd

    • SHA1

      0d46bbb56035d780ce4055e1d179c9c8dbe1c172

    • SHA256

      85ba061146658f121029eb4395fdc48bd901b73be815ad3a1e76ce2471aa99b8

    • SHA512

      fbcc7f0f7e62eb2a91e4eb34cce1ff6a946ba2f70556f9423fba0e1c9f3e8b858546499e317c872e2650d4ff9b744a6e5ec8e2f164632d98f1ff945ddba7c26b

    • SSDEEP

      1536:PFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgPHuS4hcTO97v7UYdEJmXN3E:tKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks