General

  • Target

    04b3a5f61e45559861e4a086a9ef10686e95577db77c9b01052e8b859598b764

  • Size

    2KB

  • Sample

    220527-y15e4sbcd2

  • MD5

    5ebacd0e320ad73f4e3fb979806d11c8

  • SHA1

    709e2ed561b066401db084ebb12e5ea0598ae9b8

  • SHA256

    04b3a5f61e45559861e4a086a9ef10686e95577db77c9b01052e8b859598b764

  • SHA512

    a9a42dfe464d4679827023eb99f5bdd0c6494d12573829bd819c899debe118c9d153b8ef37a405737dafe57c12eb839442822f355547eb5d8289e2eadc2de232

Score
10/10

Malware Config

Targets

    • Target

      vipiska.js

    • Size

      5KB

    • MD5

      3e7dc530905b67ac76acc38bdc974df5

    • SHA1

      f09e6de02c8db0e98f70d49a1f1c72e0cbd4cf05

    • SHA256

      964a847af1fec2ffa90d88f1b02c5f2c120bf6f7e664fd3e0693175bc2bd7c77

    • SHA512

      8e08aa4fccdd9b4314cf94010bcd85396bee797fd2d8d1ef615a2ed6b0d5a2be7e25610113ac01f9da8352b601d1d9dcf10898c76a41bfd679b2f0bb8fef2e3c

    Score
    10/10
    • suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

      suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks