General

  • Target

    41e337e7b92563efd2864cd6a35b0adb202e9096b79cdef298fe431e6b32618c

  • Size

    40KB

  • Sample

    241121-aeeqkaxbpp

  • MD5

    6ec67720eb518a0dfe5d7801707e3dac

  • SHA1

    351c83770218cb1f38b1439a17ddacd45fccef75

  • SHA256

    41e337e7b92563efd2864cd6a35b0adb202e9096b79cdef298fe431e6b32618c

  • SHA512

    37529924e97c9e0f8d810cf4d1bd44fa7d0cc48a0146321609c01a0cc219e8e17c552593cdd0d399f2f7bdbfb9b10d0d0449b9231248c7257ee086f940636909

  • SSDEEP

    768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1ls:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://easiercommunications.com/wp-content/w/

xlm40.dropper

http://dulichdichvu.net/libraries/QhtrjCZymLp5EbqOdpKk/

xlm40.dropper

https://www.whow.fr/wp-includes/H54Fgj0tG/

xlm40.dropper

http://genccagdas.com.tr/assets/TTHOm833iNn3BxT/

xlm40.dropper

http://heaventechnologies.com.pk/apitest/xdeAU0rx26LT9I/

xlm40.dropper

http://goonboy.com/goonie/bSFz7Av/

Targets

    • Target

      41e337e7b92563efd2864cd6a35b0adb202e9096b79cdef298fe431e6b32618c

    • Size

      40KB

    • MD5

      6ec67720eb518a0dfe5d7801707e3dac

    • SHA1

      351c83770218cb1f38b1439a17ddacd45fccef75

    • SHA256

      41e337e7b92563efd2864cd6a35b0adb202e9096b79cdef298fe431e6b32618c

    • SHA512

      37529924e97c9e0f8d810cf4d1bd44fa7d0cc48a0146321609c01a0cc219e8e17c552593cdd0d399f2f7bdbfb9b10d0d0449b9231248c7257ee086f940636909

    • SSDEEP

      768:pkZKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgACCBn9kC+xbwcZfqG9tMvcVi1ls:p+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/d0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks