General

  • Target

    a8aae90da889f3f56a481729e521ed87

  • Size

    36KB

  • Sample

    231222-qxvshaafdm

  • MD5

    a8aae90da889f3f56a481729e521ed87

  • SHA1

    1623211599baeb234ad2afb99f8ed3499e91068a

  • SHA256

    9786219c44a820b63ec037897e414747dea8e61fe09e1cf2f5565308c9424b7d

  • SHA512

    e38993bef08721b4b0968f7a96c11f40e98653f4f9e8898f66f7def31f1e239d125e2c89e2212d8a43c888e1c0e8329e9b7dd2e4a8f035728a121c8257f910be

  • SSDEEP

    768:UPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJrmSwvFpRFfl20/nKeAXm:Qok3hbdlylKsgqopeJBWhZFGkE+cL2Nv

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      a8aae90da889f3f56a481729e521ed87

    • Size

      36KB

    • MD5

      a8aae90da889f3f56a481729e521ed87

    • SHA1

      1623211599baeb234ad2afb99f8ed3499e91068a

    • SHA256

      9786219c44a820b63ec037897e414747dea8e61fe09e1cf2f5565308c9424b7d

    • SHA512

      e38993bef08721b4b0968f7a96c11f40e98653f4f9e8898f66f7def31f1e239d125e2c89e2212d8a43c888e1c0e8329e9b7dd2e4a8f035728a121c8257f910be

    • SSDEEP

      768:UPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJrmSwvFpRFfl20/nKeAXm:Qok3hbdlylKsgqopeJBWhZFGkE+cL2Nv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks