General

  • Target

    e438f226359443d1aec93a1d5398c35a

  • Size

    36KB

  • Sample

    231220-tp31paghgl

  • MD5

    e438f226359443d1aec93a1d5398c35a

  • SHA1

    a049f73db1d73dc0128d0708a333c0842a85053c

  • SHA256

    20886eeef5d5c2839b5e4313514ab4a02ede3ac0690aaaa5ddf562a16012af3d

  • SHA512

    1ddf44d344913de0ad00597d88f5fc334506ea4f6928e5d371fd0039e443ed9fea6414fdcf8630672212e1238c4ba11103c852bfc02539c9d424add6e2e46ca6

  • SSDEEP

    768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJiZ2GAkwypdN7oVEH+BK/:tok3hbdlylKsgqopeJBWhZFGkE+cL2Nh

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      e438f226359443d1aec93a1d5398c35a

    • Size

      36KB

    • MD5

      e438f226359443d1aec93a1d5398c35a

    • SHA1

      a049f73db1d73dc0128d0708a333c0842a85053c

    • SHA256

      20886eeef5d5c2839b5e4313514ab4a02ede3ac0690aaaa5ddf562a16012af3d

    • SHA512

      1ddf44d344913de0ad00597d88f5fc334506ea4f6928e5d371fd0039e443ed9fea6414fdcf8630672212e1238c4ba11103c852bfc02539c9d424add6e2e46ca6

    • SSDEEP

      768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJiZ2GAkwypdN7oVEH+BK/:tok3hbdlylKsgqopeJBWhZFGkE+cL2Nh

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks