General

  • Target

    23ab118b763bf35d9114a428b1209fda

  • Size

    36KB

  • Sample

    231221-3b77xscbh5

  • MD5

    23ab118b763bf35d9114a428b1209fda

  • SHA1

    42866b9b06fd652974c8bb151f18d9df76fd7ac6

  • SHA256

    978708d1b025c0a9691bf62fa74d5b98865d59f90fe503c0de2f7d530db46896

  • SHA512

    b547991b3601c78ef8406ebc2d67423753f7d6dccd7ad0df2748b53e1bb1f283b765d3e8dfcbc19402f48500ec9835c2fa2826a171b4e577da0ed55431d95388

  • SSDEEP

    768:CPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhEG8LRWx880eUSf:mok3hbdlylKsgqopeJBWhZFGkE+cL2NU

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

xlm40.dropper

https://statedauto.com/wp-data.php

Targets

    • Target

      23ab118b763bf35d9114a428b1209fda

    • Size

      36KB

    • MD5

      23ab118b763bf35d9114a428b1209fda

    • SHA1

      42866b9b06fd652974c8bb151f18d9df76fd7ac6

    • SHA256

      978708d1b025c0a9691bf62fa74d5b98865d59f90fe503c0de2f7d530db46896

    • SHA512

      b547991b3601c78ef8406ebc2d67423753f7d6dccd7ad0df2748b53e1bb1f283b765d3e8dfcbc19402f48500ec9835c2fa2826a171b4e577da0ed55431d95388

    • SSDEEP

      768:CPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhEG8LRWx880eUSf:mok3hbdlylKsgqopeJBWhZFGkE+cL2NU

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks