General

  • Target

    597cf5f85f9255ae207cbd8af397d0ec

  • Size

    36KB

  • Sample

    240113-1lhc5sefbn

  • MD5

    597cf5f85f9255ae207cbd8af397d0ec

  • SHA1

    aa2f5ab185004bf683bce0171e8871b811ac352d

  • SHA256

    4f61cbe170b2ebfc1f3278fe080f3a1d24e933b8bc63cfecd5de6bbbe2ed97d5

  • SHA512

    ca7f11e26206c71a485293d626491155a1fa0dcea7763e383a739a80069f0912a7ec2db948138b2b28fa8a8a340d58a5e2cd8524071389ac42a6775f3b8b2525

  • SSDEEP

    768:vPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ52cHVR4GgVeb9:Hok3hbdlylKsgqopeJBWhZFGkE+cL2Nk

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      597cf5f85f9255ae207cbd8af397d0ec

    • Size

      36KB

    • MD5

      597cf5f85f9255ae207cbd8af397d0ec

    • SHA1

      aa2f5ab185004bf683bce0171e8871b811ac352d

    • SHA256

      4f61cbe170b2ebfc1f3278fe080f3a1d24e933b8bc63cfecd5de6bbbe2ed97d5

    • SHA512

      ca7f11e26206c71a485293d626491155a1fa0dcea7763e383a739a80069f0912a7ec2db948138b2b28fa8a8a340d58a5e2cd8524071389ac42a6775f3b8b2525

    • SSDEEP

      768:vPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ52cHVR4GgVeb9:Hok3hbdlylKsgqopeJBWhZFGkE+cL2Nk

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks