General

  • Target

    104255bbf770c94190edddc49021b5011271126432bbe0f597a61a55755c444e

  • Size

    36KB

  • Sample

    230129-x3ag3saf97

  • MD5

    25dd382ee6cc4750d2b64bad7462b3c6

  • SHA1

    309191c3dd43fa9c1038d8946b60692619b18c2f

  • SHA256

    104255bbf770c94190edddc49021b5011271126432bbe0f597a61a55755c444e

  • SHA512

    cedec53b7725427e6d921303af0b4bbd20b4e63801b7f44fce4b71a7e3f013c2a7a5094d9f5f23428c6282fa143e7eda7657ef71663392df35b2c9891cf4db9d

  • SSDEEP

    768:GPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ62iu8PM6SbqWmg:6ok3hbdlylKsgqopeJBWhZFGkE+cL2Nk

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

Targets

    • Target

      104255bbf770c94190edddc49021b5011271126432bbe0f597a61a55755c444e

    • Size

      36KB

    • MD5

      25dd382ee6cc4750d2b64bad7462b3c6

    • SHA1

      309191c3dd43fa9c1038d8946b60692619b18c2f

    • SHA256

      104255bbf770c94190edddc49021b5011271126432bbe0f597a61a55755c444e

    • SHA512

      cedec53b7725427e6d921303af0b4bbd20b4e63801b7f44fce4b71a7e3f013c2a7a5094d9f5f23428c6282fa143e7eda7657ef71663392df35b2c9891cf4db9d

    • SSDEEP

      768:GPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ62iu8PM6SbqWmg:6ok3hbdlylKsgqopeJBWhZFGkE+cL2Nk

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks