General

  • Target

    6b8a499d19434d3411892e57a3c36505cb47778160d8419b0845cdfa21a05a0d

  • Size

    95KB

  • Sample

    241120-zystzashld

  • MD5

    83778087d258eee97ac35ac58b638634

  • SHA1

    f8efecaf6d9c517f0e83516b16ce2645ff606363

  • SHA256

    6b8a499d19434d3411892e57a3c36505cb47778160d8419b0845cdfa21a05a0d

  • SHA512

    26828b63d97472cd44793f154e146ae13e19f77a14b05be69ecef1cf500682593156bc2334aa54ded3f819664de4ad83ebbd5560d750567480d3823891d61d18

  • SSDEEP

    1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCQ+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://francite.net/images/XI7zS0X1nY/

xlm40.dropper

https://cointrade.world/receipts/Sa6fYJpecEVqiRf05/

xlm40.dropper

http://gedebey-tvradio.info/wp-includes/nOmdPyUpDB/

xlm40.dropper

http://haircutbar.com/cgi-bin/SpJT9OKPmUpJfkGqv/

Targets

    • Target

      6b8a499d19434d3411892e57a3c36505cb47778160d8419b0845cdfa21a05a0d

    • Size

      95KB

    • MD5

      83778087d258eee97ac35ac58b638634

    • SHA1

      f8efecaf6d9c517f0e83516b16ce2645ff606363

    • SHA256

      6b8a499d19434d3411892e57a3c36505cb47778160d8419b0845cdfa21a05a0d

    • SHA512

      26828b63d97472cd44793f154e146ae13e19f77a14b05be69ecef1cf500682593156bc2334aa54ded3f819664de4ad83ebbd5560d750567480d3823891d61d18

    • SSDEEP

      1536:iFKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg1HuS4hcTO97v7UYdEJmSCQ+:cKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks