General

  • Target

    5cfb84eafabc8e147efb58b10d0995bca0b7e6ceca5f7e65caa84823556b0f5f

  • Size

    36KB

  • Sample

    230129-x22j6scb4w

  • MD5

    7248836e2c948b62017f817562678f47

  • SHA1

    43da99f9f7645e1eb7eb7eb20bd823c4ef684dde

  • SHA256

    5cfb84eafabc8e147efb58b10d0995bca0b7e6ceca5f7e65caa84823556b0f5f

  • SHA512

    5ee9343d5b9d381591d544d933c2e237f48f9a6298f6cef74541e2d51ce30f10f8bd87c85f2810ab3ac182d5eaffac2499b3e2789771e8692571bfc12b415144

  • SSDEEP

    768:0PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJALfOzSxV3MbDl8Ll:wok3hbdlylKsgqopeJBWhZFGkE+cL2NF

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

xlm40.dropper

https://statedauto.com/wp-data.php

Targets

    • Target

      5cfb84eafabc8e147efb58b10d0995bca0b7e6ceca5f7e65caa84823556b0f5f

    • Size

      36KB

    • MD5

      7248836e2c948b62017f817562678f47

    • SHA1

      43da99f9f7645e1eb7eb7eb20bd823c4ef684dde

    • SHA256

      5cfb84eafabc8e147efb58b10d0995bca0b7e6ceca5f7e65caa84823556b0f5f

    • SHA512

      5ee9343d5b9d381591d544d933c2e237f48f9a6298f6cef74541e2d51ce30f10f8bd87c85f2810ab3ac182d5eaffac2499b3e2789771e8692571bfc12b415144

    • SSDEEP

      768:0PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJALfOzSxV3MbDl8Ll:wok3hbdlylKsgqopeJBWhZFGkE+cL2NF

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks