General

  • Target

    48b206fa3001ff4f06394a3ec2c366a9859f5722461511418dbc5585c86bf407

  • Size

    60KB

  • Sample

    241121-ac3plswnct

  • MD5

    d7636a31f21b3c86bcac82757a3fe351

  • SHA1

    3f8fb437e613fb7de41fa4ada398793e66bf6787

  • SHA256

    48b206fa3001ff4f06394a3ec2c366a9859f5722461511418dbc5585c86bf407

  • SHA512

    206a1e30eef32d43896260460a93a76a6c8570e1b5534bdb20814bac3553c1546b9b2038e5d83159b04c65f787cecf3cb15a00fc3b819b8a15668cba6abe2530

  • SSDEEP

    1536:NpKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgUDOJiA6Cv/UGLI36yOAR5N:rKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgQ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.valyval.com/pun/VAYL/

xlm40.dropper

http://cabans.com/CeudWYRQEzZgrHPcI/

xlm40.dropper

http://calzadoyuyin.com/cgj-bin/jZPff/

xlm40.dropper

http://cagranus.com/slide/mcqAFuMhaekn/

Targets

    • Target

      48b206fa3001ff4f06394a3ec2c366a9859f5722461511418dbc5585c86bf407

    • Size

      60KB

    • MD5

      d7636a31f21b3c86bcac82757a3fe351

    • SHA1

      3f8fb437e613fb7de41fa4ada398793e66bf6787

    • SHA256

      48b206fa3001ff4f06394a3ec2c366a9859f5722461511418dbc5585c86bf407

    • SHA512

      206a1e30eef32d43896260460a93a76a6c8570e1b5534bdb20814bac3553c1546b9b2038e5d83159b04c65f787cecf3cb15a00fc3b819b8a15668cba6abe2530

    • SSDEEP

      1536:NpKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgUDOJiA6Cv/UGLI36yOAR5N:rKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks