General

  • Target

    24ec37e213c6fb8ce9c6094c124754b178ea285c3fad7b5bd57ace6d4bed6618

  • Size

    56KB

  • Sample

    250321-1gefpazzet

  • MD5

    08d32837ce6208c8327e6ff96ebb004b

  • SHA1

    113fca0e71a139a0569f52c595e15ace252cfb97

  • SHA256

    24ec37e213c6fb8ce9c6094c124754b178ea285c3fad7b5bd57ace6d4bed6618

  • SHA512

    3609c93c2e849632871cf69f8b3a2c1c71fa4d45dcfdaa7ba2091421c8af503ac8224ac4f806aecae70f63ee93b167a821f6c9a69df000e80e2305d518ff9182

  • SSDEEP

    1536:bsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg/5G9XSZ4umv+:YKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgJ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://church.ktc-center.net/PbSkdCOW/

xlm40.dropper

https://chobemaster.com/components/gus/

xlm40.dropper

https://christianchapman.com/cgi-bin/gADHL9UXSFUTN/

xlm40.dropper

http://chmiola.net/audio/6OuzyjPS/

Targets

    • Target

      24ec37e213c6fb8ce9c6094c124754b178ea285c3fad7b5bd57ace6d4bed6618

    • Size

      56KB

    • MD5

      08d32837ce6208c8327e6ff96ebb004b

    • SHA1

      113fca0e71a139a0569f52c595e15ace252cfb97

    • SHA256

      24ec37e213c6fb8ce9c6094c124754b178ea285c3fad7b5bd57ace6d4bed6618

    • SHA512

      3609c93c2e849632871cf69f8b3a2c1c71fa4d45dcfdaa7ba2091421c8af503ac8224ac4f806aecae70f63ee93b167a821f6c9a69df000e80e2305d518ff9182

    • SSDEEP

      1536:bsKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg/5G9XSZ4umv+:YKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgJ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks