General

  • Target

    ece3c2a8d380f3ae2c064662744345cb

  • Size

    36KB

  • Sample

    231222-ts1dzafacq

  • MD5

    ece3c2a8d380f3ae2c064662744345cb

  • SHA1

    37b0210ee9a20b35402e9c2782f0c447408f50f0

  • SHA256

    9784ad39a5b25c26323c03aaa60e87c35070a0b6529fdf8ecd90b4942f26ada7

  • SHA512

    8d5e200a601efd3d66280c2d9883a6bfb504eb7851a5f7a868e96006cb91de22702fc4cbd5821bc65f79dafeb6930a41445497ee2a21a9c684e963a79e5a04bf

  • SSDEEP

    768:RPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhab5eL40TjLYf:Zok3hbdlylKsgqopeJBWhZFGkE+cL2NN

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      ece3c2a8d380f3ae2c064662744345cb

    • Size

      36KB

    • MD5

      ece3c2a8d380f3ae2c064662744345cb

    • SHA1

      37b0210ee9a20b35402e9c2782f0c447408f50f0

    • SHA256

      9784ad39a5b25c26323c03aaa60e87c35070a0b6529fdf8ecd90b4942f26ada7

    • SHA512

      8d5e200a601efd3d66280c2d9883a6bfb504eb7851a5f7a868e96006cb91de22702fc4cbd5821bc65f79dafeb6930a41445497ee2a21a9c684e963a79e5a04bf

    • SSDEEP

      768:RPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhab5eL40TjLYf:Zok3hbdlylKsgqopeJBWhZFGkE+cL2NN

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks