General

  • Target

    31c88bd787ad1521a482a784599dd9db

  • Size

    36KB

  • Sample

    231222-aglxnaebfj

  • MD5

    31c88bd787ad1521a482a784599dd9db

  • SHA1

    ef2ead083cf80ee1328c6aa669168a1685dfceb9

  • SHA256

    4b498ce21e6d0a18d82a35bb04cfee81513f97b80927c9c9bc7e1ea9c6267f6b

  • SHA512

    6dbc1b44bb163207eefcc2ee192f7bcfcc54629e239f69a5a08cdb9d110f03f4bd091f1afe3b85eb4e2799c6ee2f0331bac83ff3b89f006fc7cc330a00712179

  • SSDEEP

    768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJzhdp8wRJwSEHka+ZT:dok3hbdlylKsgqopeJBWhZFGkE+cL2Nq

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      31c88bd787ad1521a482a784599dd9db

    • Size

      36KB

    • MD5

      31c88bd787ad1521a482a784599dd9db

    • SHA1

      ef2ead083cf80ee1328c6aa669168a1685dfceb9

    • SHA256

      4b498ce21e6d0a18d82a35bb04cfee81513f97b80927c9c9bc7e1ea9c6267f6b

    • SHA512

      6dbc1b44bb163207eefcc2ee192f7bcfcc54629e239f69a5a08cdb9d110f03f4bd091f1afe3b85eb4e2799c6ee2f0331bac83ff3b89f006fc7cc330a00712179

    • SSDEEP

      768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJzhdp8wRJwSEHka+ZT:dok3hbdlylKsgqopeJBWhZFGkE+cL2Nq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks