General

  • Target

    da9b41b7ea663449ce9b0437e97a07fa

  • Size

    36KB

  • Sample

    231220-s3bypahgem

  • MD5

    da9b41b7ea663449ce9b0437e97a07fa

  • SHA1

    f409a19a788d68f38ac9b690c48fec53c329f0e8

  • SHA256

    f6f7666166cba37d63ebce17104ab71b866f3973343cdbe9255e07bd434dc8dd

  • SHA512

    2adaf5a917c371e6972052990b7a5a271745e1290e11606f934a9dfd2e043945c141a76444312d47cfe63b3af90dfa076f5f185bee868b42f45bde9c3b06f055

  • SSDEEP

    768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJls5RUOX5blBw:tok3hbdlylKsgqopeJBWhZFGkE+cL2Ne

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      da9b41b7ea663449ce9b0437e97a07fa

    • Size

      36KB

    • MD5

      da9b41b7ea663449ce9b0437e97a07fa

    • SHA1

      f409a19a788d68f38ac9b690c48fec53c329f0e8

    • SHA256

      f6f7666166cba37d63ebce17104ab71b866f3973343cdbe9255e07bd434dc8dd

    • SHA512

      2adaf5a917c371e6972052990b7a5a271745e1290e11606f934a9dfd2e043945c141a76444312d47cfe63b3af90dfa076f5f185bee868b42f45bde9c3b06f055

    • SSDEEP

      768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJls5RUOX5blBw:tok3hbdlylKsgqopeJBWhZFGkE+cL2Ne

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks