General

  • Target

    3a2a493445f99b7dcaca0d0e7c0d9291

  • Size

    35KB

  • Sample

    231231-r3m6aagbgk

  • MD5

    3a2a493445f99b7dcaca0d0e7c0d9291

  • SHA1

    1ff1f21f7dc4a01d9796687b405782e766c587bb

  • SHA256

    7866226257cf566903342b2bf987e8a3f0f6f9c0c7c5951b4feaf74e5821e042

  • SHA512

    cfbf54525e203e66c2bc51ac00c5c140226723bc93b6c85590208dc684e2542434de860895986d2879999fd7f59ef53aecd194b25ff190a4913d2e327a102ade

  • SSDEEP

    768:TPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJX2edkc5MkZEUF:Lok3hbdlylKsgqopeJBWhZFGkE+cL2Nq

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      3a2a493445f99b7dcaca0d0e7c0d9291

    • Size

      35KB

    • MD5

      3a2a493445f99b7dcaca0d0e7c0d9291

    • SHA1

      1ff1f21f7dc4a01d9796687b405782e766c587bb

    • SHA256

      7866226257cf566903342b2bf987e8a3f0f6f9c0c7c5951b4feaf74e5821e042

    • SHA512

      cfbf54525e203e66c2bc51ac00c5c140226723bc93b6c85590208dc684e2542434de860895986d2879999fd7f59ef53aecd194b25ff190a4913d2e327a102ade

    • SSDEEP

      768:TPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJX2edkc5MkZEUF:Lok3hbdlylKsgqopeJBWhZFGkE+cL2Nq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks