General

  • Target

    eb1ac511b502416eee27b2a29d4fc50c13992251e854c2e84d37e887a2b7b55e

  • Size

    96KB

  • Sample

    241120-z3txtsxrhj

  • MD5

    8caf29cadcf9ea320d90b4a7331a9b07

  • SHA1

    7bcc611ef252e789d2ece1ff3e13a841370b479a

  • SHA256

    eb1ac511b502416eee27b2a29d4fc50c13992251e854c2e84d37e887a2b7b55e

  • SHA512

    49ed7733548c8be6bc29b260d7dc9c0076f1a5ac4355af5d29e78e29f97c527009604b1ce8f829f34a19110a267ba89e133406ed95e52f5ca5f9fa1e15aed341

  • SSDEEP

    1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJm97:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgv

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://bpsjambi.id/about/CcN5IbuInPQ/

xlm40.dropper

https://greenlizard.co.za/amanah/pu8xeUOpqqq/

xlm40.dropper

https://akuntansi.itny.ac.id/asset/NH7qwRrn81Taa0VVqpx/

xlm40.dropper

https://www.yell.ge/nav_logo/x960wo3PHaIUm/

Targets

    • Target

      eb1ac511b502416eee27b2a29d4fc50c13992251e854c2e84d37e887a2b7b55e

    • Size

      96KB

    • MD5

      8caf29cadcf9ea320d90b4a7331a9b07

    • SHA1

      7bcc611ef252e789d2ece1ff3e13a841370b479a

    • SHA256

      eb1ac511b502416eee27b2a29d4fc50c13992251e854c2e84d37e887a2b7b55e

    • SHA512

      49ed7733548c8be6bc29b260d7dc9c0076f1a5ac4355af5d29e78e29f97c527009604b1ce8f829f34a19110a267ba89e133406ed95e52f5ca5f9fa1e15aed341

    • SSDEEP

      1536:WkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEHuS4hcTO97v7UYdEJm97:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks