General

  • Target

    06e8f48e07b9ae798210b3887b6f69d38a31492b26c5c6988d7b85a4f05a43be

  • Size

    95KB

  • Sample

    241120-wxm1jsvqdn

  • MD5

    43feebc51e09847ec6c57c890b890bca

  • SHA1

    999aabdc96de0320a34f7206551b8b8bc3a87438

  • SHA256

    06e8f48e07b9ae798210b3887b6f69d38a31492b26c5c6988d7b85a4f05a43be

  • SHA512

    8030cb89ba032ed44c039e19c964a3198cbad6a492af7310369685e19ac7a8dc99c7db09241df779471a091806587b2870d59e0d6d38c88f8621ef2854547ef6

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmp:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgE

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      06e8f48e07b9ae798210b3887b6f69d38a31492b26c5c6988d7b85a4f05a43be

    • Size

      95KB

    • MD5

      43feebc51e09847ec6c57c890b890bca

    • SHA1

      999aabdc96de0320a34f7206551b8b8bc3a87438

    • SHA256

      06e8f48e07b9ae798210b3887b6f69d38a31492b26c5c6988d7b85a4f05a43be

    • SHA512

      8030cb89ba032ed44c039e19c964a3198cbad6a492af7310369685e19ac7a8dc99c7db09241df779471a091806587b2870d59e0d6d38c88f8621ef2854547ef6

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJmp:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgE

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks