General

  • Target

    a91f7282472d704822644a1305cbd2fa3d71f1880d969c5e5c2332fb1e83ff94

  • Size

    231KB

  • Sample

    250318-z25b6sxya1

  • MD5

    4bd33bcfa7c54af519c632d5fa26f571

  • SHA1

    f8cd2bb9cec5ebd6db5715a636a54002d8fd3637

  • SHA256

    a91f7282472d704822644a1305cbd2fa3d71f1880d969c5e5c2332fb1e83ff94

  • SHA512

    4b2cb5415d314eef601d6f46e9c5bdebf2492e98626186cafd214a28663c3be3d482a6a29d5c3565826bcd7f04e792bd4aaf558afbd3968368c99f8fa872f4cd

  • SSDEEP

    6144:eKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgJ2IS7FgiJsJ4BR5043yVuBCMmnqLsCM:UzGiK4504Sy/mnqoCM

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://188.127.235.244/45734.8845773148.dat

xlm40.dropper

http://193.38.54.244/45734.8845773148.dat

xlm40.dropper

http://185.82.217.213/45734.8845773148.dat

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://188.127.235.244/45734.8846040509.dat

xlm40.dropper

http://193.38.54.244/45734.8846040509.dat

xlm40.dropper

http://185.82.217.213/45734.8846040509.dat

xlm40.dropper

http://45734.8846040509.dat

Targets

    • Target

      a91f7282472d704822644a1305cbd2fa3d71f1880d969c5e5c2332fb1e83ff94

    • Size

      231KB

    • MD5

      4bd33bcfa7c54af519c632d5fa26f571

    • SHA1

      f8cd2bb9cec5ebd6db5715a636a54002d8fd3637

    • SHA256

      a91f7282472d704822644a1305cbd2fa3d71f1880d969c5e5c2332fb1e83ff94

    • SHA512

      4b2cb5415d314eef601d6f46e9c5bdebf2492e98626186cafd214a28663c3be3d482a6a29d5c3565826bcd7f04e792bd4aaf558afbd3968368c99f8fa872f4cd

    • SSDEEP

      6144:eKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgJ2IS7FgiJsJ4BR5043yVuBCMmnqLsCM:UzGiK4504Sy/mnqoCM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks