General

  • Target

    65b165fc81ec5ab7029f7b20f61550bf053b566b4dbc8706466ba046b848cb52

  • Size

    95KB

  • Sample

    241120-xgtc3asblp

  • MD5

    3f7cebc4b56a67afd918d7ebb6efa4c9

  • SHA1

    145dc3e942a6f6a38afdce1c7a06081230734ab7

  • SHA256

    65b165fc81ec5ab7029f7b20f61550bf053b566b4dbc8706466ba046b848cb52

  • SHA512

    87aaf29cc4e2e3dd5e2eefe9d4db95769fcc14febca9cd47894bf5bf19b1029d112545b853010f90ace8251beb2f40a1ebaa5f47dbc714226f904b5bf917bfd8

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm5:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://fikti.bem.gunadarma.ac.id/SDM/YH8OJ1Zz8miBX/

xlm40.dropper

http://ebuysa.co.za/yt-assets/yZ30/

xlm40.dropper

http://3dstudioa.com.br/files/1ubPAB/

xlm40.dropper

http://boardmart.co.za/images/DvMHPbTLn/

Targets

    • Target

      65b165fc81ec5ab7029f7b20f61550bf053b566b4dbc8706466ba046b848cb52

    • Size

      95KB

    • MD5

      3f7cebc4b56a67afd918d7ebb6efa4c9

    • SHA1

      145dc3e942a6f6a38afdce1c7a06081230734ab7

    • SHA256

      65b165fc81ec5ab7029f7b20f61550bf053b566b4dbc8706466ba046b848cb52

    • SHA512

      87aaf29cc4e2e3dd5e2eefe9d4db95769fcc14febca9cd47894bf5bf19b1029d112545b853010f90ace8251beb2f40a1ebaa5f47dbc714226f904b5bf917bfd8

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgNHuS4hcTO97v7UYdEJm5:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks