General

  • Target

    0554b7386ea58be7cf6e67abba0ffe2d

  • Size

    36KB

  • Sample

    231229-15cxrsbhfj

  • MD5

    0554b7386ea58be7cf6e67abba0ffe2d

  • SHA1

    0ee567f7353b31c38cbc8c289be8cec8e769f3a6

  • SHA256

    e02a60fcbeab7cb5f81ac2a48509a95af40fd195b552a64fac719a3861551aaf

  • SHA512

    f52b35bfc8765e75e7660d02f770c0cd465b661157e53806b7b100c7a938a7397415aa7bda194e92c6853ddb0de8a5b74e3e3e365a66199b4d1162300bc3c0ee

  • SSDEEP

    768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJl7kE1KekxhBA33:dok3hbdlylKsgqopeJBWhZFGkE+cL2N2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      0554b7386ea58be7cf6e67abba0ffe2d

    • Size

      36KB

    • MD5

      0554b7386ea58be7cf6e67abba0ffe2d

    • SHA1

      0ee567f7353b31c38cbc8c289be8cec8e769f3a6

    • SHA256

      e02a60fcbeab7cb5f81ac2a48509a95af40fd195b552a64fac719a3861551aaf

    • SHA512

      f52b35bfc8765e75e7660d02f770c0cd465b661157e53806b7b100c7a938a7397415aa7bda194e92c6853ddb0de8a5b74e3e3e365a66199b4d1162300bc3c0ee

    • SSDEEP

      768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJl7kE1KekxhBA33:dok3hbdlylKsgqopeJBWhZFGkE+cL2N2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks