General

  • Target

    46c34712b0415e682308c418611ab89131be094bec5284a032658f3b32536ffc

  • Size

    36KB

  • Sample

    230129-x241ascb41

  • MD5

    2f21e8bdf4ec968be9c650113b20695d

  • SHA1

    22a5eaf5a7214f7e9d8bf664a91c62d6d2a862d5

  • SHA256

    46c34712b0415e682308c418611ab89131be094bec5284a032658f3b32536ffc

  • SHA512

    679065984249c3c7d5f57b0f39ca747372ba1a0c2d50a65d0330374a8fa4dd770e7ac14b9bc85ad2cb368331363152c892fe671633f6ec23084d4ec445db4106

  • SSDEEP

    768:rPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJrnuGt6HmzdsJQCHhhJ:Tok3hbdlylKsgqopeJBWhZFGkE+cL2Nj

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

xlm40.dropper

https://statedauto.com/wp-data.php

Targets

    • Target

      46c34712b0415e682308c418611ab89131be094bec5284a032658f3b32536ffc

    • Size

      36KB

    • MD5

      2f21e8bdf4ec968be9c650113b20695d

    • SHA1

      22a5eaf5a7214f7e9d8bf664a91c62d6d2a862d5

    • SHA256

      46c34712b0415e682308c418611ab89131be094bec5284a032658f3b32536ffc

    • SHA512

      679065984249c3c7d5f57b0f39ca747372ba1a0c2d50a65d0330374a8fa4dd770e7ac14b9bc85ad2cb368331363152c892fe671633f6ec23084d4ec445db4106

    • SSDEEP

      768:rPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJrnuGt6HmzdsJQCHhhJ:Tok3hbdlylKsgqopeJBWhZFGkE+cL2Nj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks