General

  • Target

    650c2c182df6e0559f35ff4f9abcde5b

  • Size

    36KB

  • Sample

    240118-lfk5hsggck

  • MD5

    650c2c182df6e0559f35ff4f9abcde5b

  • SHA1

    09445d3187cb882565606398c62e99cdee92ebc0

  • SHA256

    d1435c4ea3365b5f78895c75fb6fc2481febfbd5329568b31ea14a98c0c67b2d

  • SHA512

    84d49f490d372940da2a777cbbdbb1187d4675414a241cc35fc3acd8d5df975cc8723dd7ece8f6f3b8cb7a6cd90de5927f44f5dcee36771e6a9e879f42f3c03f

  • SSDEEP

    768:NPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJzyS7QdRlKzlisHUC:lok3hbdlylKsgqopeJBWhZFGkE+cL2Nc

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      650c2c182df6e0559f35ff4f9abcde5b

    • Size

      36KB

    • MD5

      650c2c182df6e0559f35ff4f9abcde5b

    • SHA1

      09445d3187cb882565606398c62e99cdee92ebc0

    • SHA256

      d1435c4ea3365b5f78895c75fb6fc2481febfbd5329568b31ea14a98c0c67b2d

    • SHA512

      84d49f490d372940da2a777cbbdbb1187d4675414a241cc35fc3acd8d5df975cc8723dd7ece8f6f3b8cb7a6cd90de5927f44f5dcee36771e6a9e879f42f3c03f

    • SSDEEP

      768:NPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJzyS7QdRlKzlisHUC:lok3hbdlylKsgqopeJBWhZFGkE+cL2Nc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks