General

  • Target

    a020675731afaa412eead402e329039e

  • Size

    36KB

  • Sample

    240216-mbyqgsgh79

  • MD5

    a020675731afaa412eead402e329039e

  • SHA1

    5c960cdbe8f1d7f98a65f115a4684a6784c5116c

  • SHA256

    e80cd5eec1117111be4f8df40aa74f602c5e13cfae1b33b1e2e2c511b8b4885a

  • SHA512

    ab1f624f0393a60592ee9dde2c7942f6c723418a53e1956c270914345e8d013c58dfdfb1c32e9348c22db1f5a6ba060f2e724966fb3c1752da5fac376819b2b4

  • SSDEEP

    768:5PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJfJ8KASPdKVcEIxk:Rok3hbdlylKsgqopeJBWhZFGkE+cL2NL

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      a020675731afaa412eead402e329039e

    • Size

      36KB

    • MD5

      a020675731afaa412eead402e329039e

    • SHA1

      5c960cdbe8f1d7f98a65f115a4684a6784c5116c

    • SHA256

      e80cd5eec1117111be4f8df40aa74f602c5e13cfae1b33b1e2e2c511b8b4885a

    • SHA512

      ab1f624f0393a60592ee9dde2c7942f6c723418a53e1956c270914345e8d013c58dfdfb1c32e9348c22db1f5a6ba060f2e724966fb3c1752da5fac376819b2b4

    • SSDEEP

      768:5PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJfJ8KASPdKVcEIxk:Rok3hbdlylKsgqopeJBWhZFGkE+cL2NL

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks