General

  • Target

    e7ccb347c1e960e183becdc294ae7d4e

  • Size

    36KB

  • Sample

    231220-ty7egabffj

  • MD5

    e7ccb347c1e960e183becdc294ae7d4e

  • SHA1

    f768709cd2d22368055bacaad46bbda854a82c35

  • SHA256

    0af3b1ae9d166d5d4cd9f5b3ae09bec375078cc04cddfda2246c0bbd14a2a487

  • SHA512

    dbbe91ff3ff7af838c7c12b753b3ebb38ddb57951f4f652cd59f85e7822c5dc245405c2f6fd653901f1d921c023a1035c30b057ec41b4c58366fa549bc4b84dc

  • SSDEEP

    768:zPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJXHTfhoWG4cEUPSHhh:rok3hbdlylKsgqopeJBWhZFGkE+cL2Nm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

Targets

    • Target

      e7ccb347c1e960e183becdc294ae7d4e

    • Size

      36KB

    • MD5

      e7ccb347c1e960e183becdc294ae7d4e

    • SHA1

      f768709cd2d22368055bacaad46bbda854a82c35

    • SHA256

      0af3b1ae9d166d5d4cd9f5b3ae09bec375078cc04cddfda2246c0bbd14a2a487

    • SHA512

      dbbe91ff3ff7af838c7c12b753b3ebb38ddb57951f4f652cd59f85e7822c5dc245405c2f6fd653901f1d921c023a1035c30b057ec41b4c58366fa549bc4b84dc

    • SSDEEP

      768:zPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJXHTfhoWG4cEUPSHhh:rok3hbdlylKsgqopeJBWhZFGkE+cL2Nm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks