General

  • Target

    48a3e9b980b570c4414685c37a4cce6a81e32005c825559bc6049f5045385242

  • Size

    36KB

  • Sample

    230129-x24drscb4z

  • MD5

    7e9e621951f87f91f15444709b64d660

  • SHA1

    5491ca45fc97c4e1f309626c0cd36fea28eea568

  • SHA256

    48a3e9b980b570c4414685c37a4cce6a81e32005c825559bc6049f5045385242

  • SHA512

    4431957e06dea4928d4c99322c74d03620ea87e3b1b84ace1f24e9d12372bc9d406525970fcad41c7031d8eab4b65861a9c45cc11a57b05e1db5a4f3d70bda5a

  • SSDEEP

    768:GPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJMCn/8n0tYadTp1Nz46n:6ok3hbdlylKsgqopeJBWhZFGkE+cL2Nq

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://statedauto.com/wp-data.php

xlm40.dropper

https://markens.online/wp-data.php

Targets

    • Target

      48a3e9b980b570c4414685c37a4cce6a81e32005c825559bc6049f5045385242

    • Size

      36KB

    • MD5

      7e9e621951f87f91f15444709b64d660

    • SHA1

      5491ca45fc97c4e1f309626c0cd36fea28eea568

    • SHA256

      48a3e9b980b570c4414685c37a4cce6a81e32005c825559bc6049f5045385242

    • SHA512

      4431957e06dea4928d4c99322c74d03620ea87e3b1b84ace1f24e9d12372bc9d406525970fcad41c7031d8eab4b65861a9c45cc11a57b05e1db5a4f3d70bda5a

    • SSDEEP

      768:GPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJMCn/8n0tYadTp1Nz46n:6ok3hbdlylKsgqopeJBWhZFGkE+cL2Nq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Execution

          Exfiltration

            Impact

              Initial Access

                Lateral Movement

                  Persistence

                    Privilege Escalation

                      Tasks