General

  • Target

    9cd84a82ff365c6700b38bdbd93a39051953845f550666003d9a3a40fc538078

  • Size

    40KB

  • Sample

    241120-xs8l5ascqj

  • MD5

    8c07c49698a3b6c55acf2dea41c1a4ed

  • SHA1

    d0829857713ebabb68d182596e40e04458cfdba8

  • SHA256

    9cd84a82ff365c6700b38bdbd93a39051953845f550666003d9a3a40fc538078

  • SHA512

    3ad6b0be61b57bad949adeddb128d7f4aa45059a96df8a187f74d1d5ea2b0c6a9beebf9589075d0142669b0271e8dfced3016bbada0e79b40698844beb1d44b8

  • SSDEEP

    768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1lw:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dY

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://easiercommunications.com/wp-content/w/

xlm40.dropper

http://dulichdichvu.net/libraries/QhtrjCZymLp5EbqOdpKk/

xlm40.dropper

https://www.whow.fr/wp-includes/H54Fgj0tG/

xlm40.dropper

http://genccagdas.com.tr/assets/TTHOm833iNn3BxT/

xlm40.dropper

http://heaventechnologies.com.pk/apitest/xdeAU0rx26LT9I/

xlm40.dropper

http://goonboy.com/goonie/bSFz7Av/

Targets

    • Target

      9cd84a82ff365c6700b38bdbd93a39051953845f550666003d9a3a40fc538078

    • Size

      40KB

    • MD5

      8c07c49698a3b6c55acf2dea41c1a4ed

    • SHA1

      d0829857713ebabb68d182596e40e04458cfdba8

    • SHA256

      9cd84a82ff365c6700b38bdbd93a39051953845f550666003d9a3a40fc538078

    • SHA512

      3ad6b0be61b57bad949adeddb128d7f4aa45059a96df8a187f74d1d5ea2b0c6a9beebf9589075d0142669b0271e8dfced3016bbada0e79b40698844beb1d44b8

    • SSDEEP

      768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1lw:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks