General

  • Target

    6b74a575e48ab50af18b09c44a83867c

  • Size

    36KB

  • Sample

    231219-v5s14agff6

  • MD5

    6b74a575e48ab50af18b09c44a83867c

  • SHA1

    f9aa2ade1635c173a8a773a469458f91c05743bd

  • SHA256

    ee83a6c67b306d5a12074b926fe8fdf09e9136f229dcd4b513dfa50ca7ed4c50

  • SHA512

    020ffdd54a0bb0fb835e5b2e0202b670de872976ae9bb95380cfa1c1e18a744c2a8a99b59ae7976d9005ca137deb367536c2bcfdf87ec1bd5bd802bba4c755ec

  • SSDEEP

    768:dPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJO4tsoQ7pO8drJW:Vok3hbdlylKsgqopeJBWhZFGkE+cL2NA

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      6b74a575e48ab50af18b09c44a83867c

    • Size

      36KB

    • MD5

      6b74a575e48ab50af18b09c44a83867c

    • SHA1

      f9aa2ade1635c173a8a773a469458f91c05743bd

    • SHA256

      ee83a6c67b306d5a12074b926fe8fdf09e9136f229dcd4b513dfa50ca7ed4c50

    • SHA512

      020ffdd54a0bb0fb835e5b2e0202b670de872976ae9bb95380cfa1c1e18a744c2a8a99b59ae7976d9005ca137deb367536c2bcfdf87ec1bd5bd802bba4c755ec

    • SSDEEP

      768:dPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJO4tsoQ7pO8drJW:Vok3hbdlylKsgqopeJBWhZFGkE+cL2NA

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks