General

  • Target

    5835437220b1a02397868f2d9df62bb0ee6018d1825f093c58781d2fa8c61989

  • Size

    243KB

  • Sample

    241120-xk2tls1cqd

  • MD5

    f4412ea5aed2febf568223d7aab435e2

  • SHA1

    14ef67b101ccc0f8c45eaf841dce94cf5b2b4f67

  • SHA256

    5835437220b1a02397868f2d9df62bb0ee6018d1825f093c58781d2fa8c61989

  • SHA512

    8bc5c8e5f0e2cca54d74ca9e84f36c668ba2d7d097f44a951c285b30dcbe3ea8e8bfacec051d86eb88446820523ac120c9626f30021b3c6801394f24dd186b50

  • SSDEEP

    6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/0c:ghEXs5fXR8rsNP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://servidorcarlosydavid.es/wp-admin/jkNPgHxNjF/

xlm40.dropper

https://gmo-sol-p10.heteml.jp/includes/UoJMgYAc1EES/

xlm40.dropper

https://iashanghai.cn/z/Z1PG6ulBh20plss/

xlm40.dropper

https://www.pasionportufuturo.pe/wp-content/HkUfvw0xuCy5/

xlm40.dropper

http://dmdagents.com.au/vqwbgz/CL4Bo4C4VS0deg/

Targets

    • Target

      5835437220b1a02397868f2d9df62bb0ee6018d1825f093c58781d2fa8c61989

    • Size

      243KB

    • MD5

      f4412ea5aed2febf568223d7aab435e2

    • SHA1

      14ef67b101ccc0f8c45eaf841dce94cf5b2b4f67

    • SHA256

      5835437220b1a02397868f2d9df62bb0ee6018d1825f093c58781d2fa8c61989

    • SHA512

      8bc5c8e5f0e2cca54d74ca9e84f36c668ba2d7d097f44a951c285b30dcbe3ea8e8bfacec051d86eb88446820523ac120c9626f30021b3c6801394f24dd186b50

    • SSDEEP

      6144:DKpbdrHYrMue8q7QPX+5xtFEdi8/dg/ThvsiKIjvl5fd1Xh8rsoX/w/0c:ghEXs5fXR8rsNP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks