General

  • Target

    03c64bffdc0784c88033d64acc67258d

  • Size

    36KB

  • Sample

    231219-md5a2sbhh9

  • MD5

    03c64bffdc0784c88033d64acc67258d

  • SHA1

    9df669dbbf8ca7310ceae64bdc86f6ee5c610f00

  • SHA256

    783cf02cc7a224c32c5d1a2c7d3131d3cac81398d3b138775a67490a3416d76d

  • SHA512

    a074a3ff33b0fe8b06150e6d1a658e9d2ccc526c0caac3a077899b6df8e50ef9505df9aef078d174c46dea4c3b4e1b002f568d5fa5ce696bf81de8bb37c2fd3c

  • SSDEEP

    768:cPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ7LrE3QCPiyNeRB8hVRcSIJI:Iok3hbdlylKsgqopeJBWhZFGkE+cL2Nz

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

Targets

    • Target

      03c64bffdc0784c88033d64acc67258d

    • Size

      36KB

    • MD5

      03c64bffdc0784c88033d64acc67258d

    • SHA1

      9df669dbbf8ca7310ceae64bdc86f6ee5c610f00

    • SHA256

      783cf02cc7a224c32c5d1a2c7d3131d3cac81398d3b138775a67490a3416d76d

    • SHA512

      a074a3ff33b0fe8b06150e6d1a658e9d2ccc526c0caac3a077899b6df8e50ef9505df9aef078d174c46dea4c3b4e1b002f568d5fa5ce696bf81de8bb37c2fd3c

    • SSDEEP

      768:cPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ7LrE3QCPiyNeRB8hVRcSIJI:Iok3hbdlylKsgqopeJBWhZFGkE+cL2Nz

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks