General

  • Target

    04ea6394559dbff1bc846be67363b6549ece00124537bf8fcd329366607c8de0

  • Size

    95KB

  • Sample

    241120-xbf6jssakr

  • MD5

    a573763181f96f9652731369b279e709

  • SHA1

    16b3ea4713fa70453b7e6a167bd649ea1c6e4af2

  • SHA256

    04ea6394559dbff1bc846be67363b6549ece00124537bf8fcd329366607c8de0

  • SHA512

    170d046a0ac4345d68d151266b6dade49c8f4ffb6b98ba8d121f722ae4c639710a69a09b41e6c513c85aad8fec4c9d3cf31143f1ad100107cdbf7f4295f42373

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYHuS4hcTO97v7UYdEJmFx2:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://educacionsanvicentefundacion.com/iplookup/wYEInbaN/

xlm40.dropper

https://www.4monkeys.com/wp-admin/dNAuBEKo/

xlm40.dropper

http://haircutbar.com/cgi-bin/dNfEA5F/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/T0J9THbd5f2/

Targets

    • Target

      04ea6394559dbff1bc846be67363b6549ece00124537bf8fcd329366607c8de0

    • Size

      95KB

    • MD5

      a573763181f96f9652731369b279e709

    • SHA1

      16b3ea4713fa70453b7e6a167bd649ea1c6e4af2

    • SHA256

      04ea6394559dbff1bc846be67363b6549ece00124537bf8fcd329366607c8de0

    • SHA512

      170d046a0ac4345d68d151266b6dade49c8f4ffb6b98ba8d121f722ae4c639710a69a09b41e6c513c85aad8fec4c9d3cf31143f1ad100107cdbf7f4295f42373

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgYHuS4hcTO97v7UYdEJmFx2:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks