General

  • Target

    8ff44f39ee5b3cd5021d09b599407526

  • Size

    36KB

  • Sample

    231219-yzfeladgg9

  • MD5

    8ff44f39ee5b3cd5021d09b599407526

  • SHA1

    dea656b94afbfa066695a871e195c77c1ea49749

  • SHA256

    e676d785465c74c1463964ffdeb1112564e32b95261749327f8ecfa325dc6e6e

  • SHA512

    ebd033fc4cd75b87cc1d178e18f8c72248006e8730ebcab34da857e18b8f2d50ac42c4eefa4ee2a94b614f28743989dbd5da83c91911d877a6dc8e1f0e872f10

  • SSDEEP

    768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJM52NylhLS4Ih4gCzYWJu:dok3hbdlylKsgqopeJBWhZFGkE+cL2Nm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      8ff44f39ee5b3cd5021d09b599407526

    • Size

      36KB

    • MD5

      8ff44f39ee5b3cd5021d09b599407526

    • SHA1

      dea656b94afbfa066695a871e195c77c1ea49749

    • SHA256

      e676d785465c74c1463964ffdeb1112564e32b95261749327f8ecfa325dc6e6e

    • SHA512

      ebd033fc4cd75b87cc1d178e18f8c72248006e8730ebcab34da857e18b8f2d50ac42c4eefa4ee2a94b614f28743989dbd5da83c91911d877a6dc8e1f0e872f10

    • SSDEEP

      768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJM52NylhLS4Ih4gCzYWJu:dok3hbdlylKsgqopeJBWhZFGkE+cL2Nm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks