General

  • Target

    8305f7eb53bcfe2375a6fcd4c6e88cea

  • Size

    36KB

  • Sample

    231219-x31dhaccdm

  • MD5

    8305f7eb53bcfe2375a6fcd4c6e88cea

  • SHA1

    26148c9c2297f0d5f8e8023df2b79e4a53a210b5

  • SHA256

    59272566f36e47653d0214d1b9ae89f8184fdc5848f7cf0de213a03aaff0ac59

  • SHA512

    942d5d330d7b30179732e66fe8165b86dbeb63140125a6d3b87d22e9604143dbf9fbd58a47492238eb28a8b919c91443d162539c68b1805f9bd07a01611d0719

  • SSDEEP

    768:0PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJeShw1bfnFLk2nZKF:wok3hbdlylKsgqopeJBWhZFGkE+cL2NM

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

Targets

    • Target

      8305f7eb53bcfe2375a6fcd4c6e88cea

    • Size

      36KB

    • MD5

      8305f7eb53bcfe2375a6fcd4c6e88cea

    • SHA1

      26148c9c2297f0d5f8e8023df2b79e4a53a210b5

    • SHA256

      59272566f36e47653d0214d1b9ae89f8184fdc5848f7cf0de213a03aaff0ac59

    • SHA512

      942d5d330d7b30179732e66fe8165b86dbeb63140125a6d3b87d22e9604143dbf9fbd58a47492238eb28a8b919c91443d162539c68b1805f9bd07a01611d0719

    • SSDEEP

      768:0PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJeShw1bfnFLk2nZKF:wok3hbdlylKsgqopeJBWhZFGkE+cL2NM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks