General

  • Target

    0807234b1a9da36fc48f82c49c78ee53

  • Size

    36KB

  • Sample

    231221-zrry4aecen

  • MD5

    0807234b1a9da36fc48f82c49c78ee53

  • SHA1

    42430b7f31ce93be620ccaa98d5276e41d03c208

  • SHA256

    e0f9964e019f7cd1f05d80f0f5b21381e174922db38fd2c7b38e9b1030855b21

  • SHA512

    8d642becedd9e5ba7bfd969ec6fb1681c47412066c68378a299ca224953821c57a407b582fb9f12fb5b5e6ea573a50c4a7c09b83de7e645a963acc3c34014302

  • SSDEEP

    768:JPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJw75iwal0AWhjv/W:Bok3hbdlylKsgqopeJBWhZFGkE+cL2N2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      0807234b1a9da36fc48f82c49c78ee53

    • Size

      36KB

    • MD5

      0807234b1a9da36fc48f82c49c78ee53

    • SHA1

      42430b7f31ce93be620ccaa98d5276e41d03c208

    • SHA256

      e0f9964e019f7cd1f05d80f0f5b21381e174922db38fd2c7b38e9b1030855b21

    • SHA512

      8d642becedd9e5ba7bfd969ec6fb1681c47412066c68378a299ca224953821c57a407b582fb9f12fb5b5e6ea573a50c4a7c09b83de7e645a963acc3c34014302

    • SSDEEP

      768:JPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJw75iwal0AWhjv/W:Bok3hbdlylKsgqopeJBWhZFGkE+cL2N2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks