General

  • Target

    07410e7d6aea2b2801b0b101076fd369

  • Size

    36KB

  • Sample

    231219-mkqq8seah5

  • MD5

    07410e7d6aea2b2801b0b101076fd369

  • SHA1

    f192035ad0a2a7fc09f06a7bbe7797ac66392a16

  • SHA256

    bc606f972ac8a393d9d1c15ceb859533a6171c150cb9dae11afa306cb3aa0ba0

  • SHA512

    eb7856b497458f4a026efaefa58f27d3a8e6b6bbce47f6d11fc91aaa42003d7ac706956f099eb73bbc7fec03ef8fdef8250d8e942da03dc74ffb49b3ae781701

  • SSDEEP

    768:CPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJOmnkMQlC8daq18tkwV:mok3hbdlylKsgqopeJBWhZFGkE+cL2NU

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

Targets

    • Target

      07410e7d6aea2b2801b0b101076fd369

    • Size

      36KB

    • MD5

      07410e7d6aea2b2801b0b101076fd369

    • SHA1

      f192035ad0a2a7fc09f06a7bbe7797ac66392a16

    • SHA256

      bc606f972ac8a393d9d1c15ceb859533a6171c150cb9dae11afa306cb3aa0ba0

    • SHA512

      eb7856b497458f4a026efaefa58f27d3a8e6b6bbce47f6d11fc91aaa42003d7ac706956f099eb73bbc7fec03ef8fdef8250d8e942da03dc74ffb49b3ae781701

    • SSDEEP

      768:CPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJOmnkMQlC8daq18tkwV:mok3hbdlylKsgqopeJBWhZFGkE+cL2NU

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks