General

  • Target

    49c60283a0e9745f91e6d038f677a1bf846239979736a5443782814efbb346b9

  • Size

    77KB

  • Sample

    241120-y9g16sxlfn

  • MD5

    65b100380b8b0a32a6522d977ad18d98

  • SHA1

    f15890e513dd27936e0a95f98ae34a3750fc6c51

  • SHA256

    49c60283a0e9745f91e6d038f677a1bf846239979736a5443782814efbb346b9

  • SHA512

    a84cbb0b38dd629c8243966df87f25cdf0b1db51735cde964926786a4c8236d6a7fe8c78d50d4ab9410566fab23816e88b01c178907233aacc676fc44098c4f3

  • SSDEEP

    1536:ZSKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTk+hD8nTLqQrRrZws8Etr:gKpb8rGYrMPe3q7Q0XV5xtezEsi8/dga

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://microlent.com/admin/kM442bdMLLMQ1qJe5/

xlm40.dropper

https://neoexc.com/cgi-bin/srN0xYgm/

xlm40.dropper

http://ong-hananel.org/PAQUES/bPiA2l6foj7kjN/

Targets

    • Target

      49c60283a0e9745f91e6d038f677a1bf846239979736a5443782814efbb346b9

    • Size

      77KB

    • MD5

      65b100380b8b0a32a6522d977ad18d98

    • SHA1

      f15890e513dd27936e0a95f98ae34a3750fc6c51

    • SHA256

      49c60283a0e9745f91e6d038f677a1bf846239979736a5443782814efbb346b9

    • SHA512

      a84cbb0b38dd629c8243966df87f25cdf0b1db51735cde964926786a4c8236d6a7fe8c78d50d4ab9410566fab23816e88b01c178907233aacc676fc44098c4f3

    • SSDEEP

      1536:ZSKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgTk+hD8nTLqQrRrZws8Etr:gKpb8rGYrMPe3q7Q0XV5xtezEsi8/dga

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks