General

  • Target

    e6744aab1197a74b5bae107e192416e1

  • Size

    36KB

  • Sample

    231220-tv528sdba7

  • MD5

    e6744aab1197a74b5bae107e192416e1

  • SHA1

    a205fafa08d1e50be999539ccf73e932f50491ed

  • SHA256

    d73d97f2af7cc6abcfb9aceb0baa6a87ca55802f6442bb795e4e09c529e056ce

  • SHA512

    9f69d5e1c04bce8adbba7ce695a23e3827be8122565c606a4524be7af339c9b7d4f1b85c8a17fd6d0e994fb1a5e0cae722b8c3b8832d2a7c29fb2d5c1a10fa10

  • SSDEEP

    768:+PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJqEYSdcCBwHOL:Cok3hbdlylKsgqopeJBWhZFGkE+cL2Ne

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

Targets

    • Target

      e6744aab1197a74b5bae107e192416e1

    • Size

      36KB

    • MD5

      e6744aab1197a74b5bae107e192416e1

    • SHA1

      a205fafa08d1e50be999539ccf73e932f50491ed

    • SHA256

      d73d97f2af7cc6abcfb9aceb0baa6a87ca55802f6442bb795e4e09c529e056ce

    • SHA512

      9f69d5e1c04bce8adbba7ce695a23e3827be8122565c606a4524be7af339c9b7d4f1b85c8a17fd6d0e994fb1a5e0cae722b8c3b8832d2a7c29fb2d5c1a10fa10

    • SSDEEP

      768:+PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJqEYSdcCBwHOL:Cok3hbdlylKsgqopeJBWhZFGkE+cL2Ne

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks