General

  • Target

    c425193788cdba9f13d90f5bcb62936b

  • Size

    36KB

  • Sample

    231220-rldkhsghdk

  • MD5

    c425193788cdba9f13d90f5bcb62936b

  • SHA1

    40e6754a4211a34c94a3c3b2638aba9c6c611ac0

  • SHA256

    32093f277b0722a44c96d80c33332a7a8bc2b02f5fed0e1547e62914f7e64e77

  • SHA512

    101efcdae30cce030d7eab58bfd1b8726819e2e580cd686513ced6ff0f315b025592abf714596ef9c0ef01e4cac9e5667455418687aaf0e61439a119cdc75c20

  • SSDEEP

    768:cPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ+CsHO+CwDdQiJa7Ji9:Iok3hbdlylKsgqopeJBWhZFGkE+cL2N/

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://statedauto.com/wp-data.php

Targets

    • Target

      c425193788cdba9f13d90f5bcb62936b

    • Size

      36KB

    • MD5

      c425193788cdba9f13d90f5bcb62936b

    • SHA1

      40e6754a4211a34c94a3c3b2638aba9c6c611ac0

    • SHA256

      32093f277b0722a44c96d80c33332a7a8bc2b02f5fed0e1547e62914f7e64e77

    • SHA512

      101efcdae30cce030d7eab58bfd1b8726819e2e580cd686513ced6ff0f315b025592abf714596ef9c0ef01e4cac9e5667455418687aaf0e61439a119cdc75c20

    • SSDEEP

      768:cPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ+CsHO+CwDdQiJa7Ji9:Iok3hbdlylKsgqopeJBWhZFGkE+cL2N/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks