General

  • Target

    7ef7dd7dd0606545dc46bf26b9ddf1ba

  • Size

    35KB

  • Sample

    231222-ktap9sdhgr

  • MD5

    7ef7dd7dd0606545dc46bf26b9ddf1ba

  • SHA1

    26acaa389e745991788d01c4dd60451d10974040

  • SHA256

    a81b71cf0f0ac33cb518765f6ced16f03b383faab88c0adf129ab15c80bb767f

  • SHA512

    c82e9a356e7268916d7d0a05c48951489061cc3b99151672b5ad9d873302addbd4e3f87bbd4a1ca437b3748bd43d094343ddaa0dee49ddb646186d65f7678f25

  • SSDEEP

    768:/PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJqSZifK/HVUQ0zjR/9M:3ok3hbdlylKsgqopeJBWhZFGkE+cL2Ny

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      7ef7dd7dd0606545dc46bf26b9ddf1ba

    • Size

      35KB

    • MD5

      7ef7dd7dd0606545dc46bf26b9ddf1ba

    • SHA1

      26acaa389e745991788d01c4dd60451d10974040

    • SHA256

      a81b71cf0f0ac33cb518765f6ced16f03b383faab88c0adf129ab15c80bb767f

    • SHA512

      c82e9a356e7268916d7d0a05c48951489061cc3b99151672b5ad9d873302addbd4e3f87bbd4a1ca437b3748bd43d094343ddaa0dee49ddb646186d65f7678f25

    • SSDEEP

      768:/PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJqSZifK/HVUQ0zjR/9M:3ok3hbdlylKsgqopeJBWhZFGkE+cL2Ny

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks