General

  • Target

    894fe156e2a2f01a47a000aab597008c

  • Size

    36KB

  • Sample

    231219-yj2mwsaae8

  • MD5

    894fe156e2a2f01a47a000aab597008c

  • SHA1

    860732d0b299a16b56b44f9e1cdb74f53719e4d7

  • SHA256

    d9919f97e9f86f9791f37aae8a04267d0298c0fe66b69f59d07834b033a59753

  • SHA512

    57d668e878d19fb3f15a0639de1a2e55e2d34235d82e5f124feda815922d38d0edf5dfd289caf080920ddad3d6c8b660c727e8ca9d2066ef1ac1be91765928e3

  • SSDEEP

    768:0PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJccffdag86ahElP:wok3hbdlylKsgqopeJBWhZFGkE+cL2N0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

Targets

    • Target

      894fe156e2a2f01a47a000aab597008c

    • Size

      36KB

    • MD5

      894fe156e2a2f01a47a000aab597008c

    • SHA1

      860732d0b299a16b56b44f9e1cdb74f53719e4d7

    • SHA256

      d9919f97e9f86f9791f37aae8a04267d0298c0fe66b69f59d07834b033a59753

    • SHA512

      57d668e878d19fb3f15a0639de1a2e55e2d34235d82e5f124feda815922d38d0edf5dfd289caf080920ddad3d6c8b660c727e8ca9d2066ef1ac1be91765928e3

    • SSDEEP

      768:0PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJccffdag86ahElP:wok3hbdlylKsgqopeJBWhZFGkE+cL2N0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks