General

  • Target

    dcd3cb2dcefaea48989dff87c3ded60e

  • Size

    35KB

  • Sample

    231220-s7sr1abdhr

  • MD5

    dcd3cb2dcefaea48989dff87c3ded60e

  • SHA1

    85866b517ff73001b5e9ad157058f8c4f3417658

  • SHA256

    7227c212f4db9943a46c1e7a48f86b80073f3290bd0eb311cd9ce6ef110e2ddd

  • SHA512

    8c61c6f8736cc6450ca40795cbaae0507f3e615b39430b8c5a9049ec9bb65aeede2c76139ab170fc161ccf68f28e85654291cb2db5ddce00dfe5040b260123db

  • SSDEEP

    768:LPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ4NtEov5qkCbjq:zok3hbdlylKsgqopeJBWhZFGkE+cL2NT

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      dcd3cb2dcefaea48989dff87c3ded60e

    • Size

      35KB

    • MD5

      dcd3cb2dcefaea48989dff87c3ded60e

    • SHA1

      85866b517ff73001b5e9ad157058f8c4f3417658

    • SHA256

      7227c212f4db9943a46c1e7a48f86b80073f3290bd0eb311cd9ce6ef110e2ddd

    • SHA512

      8c61c6f8736cc6450ca40795cbaae0507f3e615b39430b8c5a9049ec9bb65aeede2c76139ab170fc161ccf68f28e85654291cb2db5ddce00dfe5040b260123db

    • SSDEEP

      768:LPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ4NtEov5qkCbjq:zok3hbdlylKsgqopeJBWhZFGkE+cL2NT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks