General

  • Target

    8edad5ba6901c7953229753e56f458fb

  • Size

    36KB

  • Sample

    240204-lyds6ahaak

  • MD5

    8edad5ba6901c7953229753e56f458fb

  • SHA1

    7c4675a6e8c8ebadbc33a0871d4e0454a90706b8

  • SHA256

    ea682315bd046be806b1cba6217c2423cf6cecf0f77572ecf9b1d25e7005941e

  • SHA512

    d5b401b40c12e2962882c65099b9c02b8c83f14013a0a4bf6937cfbab992e0675270d9ab3e69976806ab7273a72fbc8c3a756de9381c394e12938ea0638c73e1

  • SSDEEP

    768:lPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJvtXKrblkdjZ3Z9:Nok3hbdlylKsgqopeJBWhZFGkE+cL2NQ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      8edad5ba6901c7953229753e56f458fb

    • Size

      36KB

    • MD5

      8edad5ba6901c7953229753e56f458fb

    • SHA1

      7c4675a6e8c8ebadbc33a0871d4e0454a90706b8

    • SHA256

      ea682315bd046be806b1cba6217c2423cf6cecf0f77572ecf9b1d25e7005941e

    • SHA512

      d5b401b40c12e2962882c65099b9c02b8c83f14013a0a4bf6937cfbab992e0675270d9ab3e69976806ab7273a72fbc8c3a756de9381c394e12938ea0638c73e1

    • SSDEEP

      768:lPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJvtXKrblkdjZ3Z9:Nok3hbdlylKsgqopeJBWhZFGkE+cL2NQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks