General

  • Target

    672d6e97bfb84a7e63fcc1283e4b505f

  • Size

    36KB

  • Sample

    240119-kk4a8aachn

  • MD5

    672d6e97bfb84a7e63fcc1283e4b505f

  • SHA1

    08238eb48884b146af90b8afe8f6f871f927cb16

  • SHA256

    adb9ba27ef2d3392323890dc4d09d5ff510d9b5dc2c0220c0bfafb464a709392

  • SHA512

    2ed67c2c8ef53dc47f5b2ec2cc03c37199f5d95f9bbdacee219d946f24a1d942fc87e3d12d30111ef9af40e4a3573755e77bbcc8e89e30c5debcdc1a860da5b8

  • SSDEEP

    768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJf+q477S+41qjz/qFe:tok3hbdlylKsgqopeJBWhZFGkE+cL2NN

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      672d6e97bfb84a7e63fcc1283e4b505f

    • Size

      36KB

    • MD5

      672d6e97bfb84a7e63fcc1283e4b505f

    • SHA1

      08238eb48884b146af90b8afe8f6f871f927cb16

    • SHA256

      adb9ba27ef2d3392323890dc4d09d5ff510d9b5dc2c0220c0bfafb464a709392

    • SHA512

      2ed67c2c8ef53dc47f5b2ec2cc03c37199f5d95f9bbdacee219d946f24a1d942fc87e3d12d30111ef9af40e4a3573755e77bbcc8e89e30c5debcdc1a860da5b8

    • SSDEEP

      768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJf+q477S+41qjz/qFe:tok3hbdlylKsgqopeJBWhZFGkE+cL2NN

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks