General

  • Target

    dcd031931c7c6e8c3700a7bc9a8cca77b712235f00a2648ad15c1f0bc344ecb2

  • Size

    95KB

  • Sample

    241120-xat11ssajr

  • MD5

    3e4a39f624218a36a43cc23cba71836e

  • SHA1

    cba78d712232b2df7a43dd9db861c24efe63db92

  • SHA256

    dcd031931c7c6e8c3700a7bc9a8cca77b712235f00a2648ad15c1f0bc344ecb2

  • SHA512

    4216ff50060589322a87417c2be62c649e78e94f853f0c8ad8ae7888c1be1838dd33d3601a405d71b525321fa1e99e017f2ebbf53215d8ec5fd7ba01aa17592d

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCA+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://francite.net/images/XI7zS0X1nY/

xlm40.dropper

https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/

xlm40.dropper

http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/

Targets

    • Target

      dcd031931c7c6e8c3700a7bc9a8cca77b712235f00a2648ad15c1f0bc344ecb2

    • Size

      95KB

    • MD5

      3e4a39f624218a36a43cc23cba71836e

    • SHA1

      cba78d712232b2df7a43dd9db861c24efe63db92

    • SHA256

      dcd031931c7c6e8c3700a7bc9a8cca77b712235f00a2648ad15c1f0bc344ecb2

    • SHA512

      4216ff50060589322a87417c2be62c649e78e94f853f0c8ad8ae7888c1be1838dd33d3601a405d71b525321fa1e99e017f2ebbf53215d8ec5fd7ba01aa17592d

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCA+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks