General

  • Target

    a6bd28e7277384379e9f4ce4155e3091

  • Size

    36KB

  • Sample

    240226-tbxxhsad2y

  • MD5

    a6bd28e7277384379e9f4ce4155e3091

  • SHA1

    3b6c478ef4db3755949e81c48527737157a74645

  • SHA256

    e173aa2ba9a8fb339692cf8b908a284588c46e0be6772cd9983efc6e6205bd51

  • SHA512

    c39a621f505520243e4b247ab3c892962301901961278bb46fbc949dfa7efefa08389749c2fea4e8951adff8663181e546169dd1c0244096e9ae9df86c7ce380

  • SSDEEP

    768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJxUgKJOzjmiS1:tok3hbdlylKsgqopeJBWhZFGkE+cL2N7

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      a6bd28e7277384379e9f4ce4155e3091

    • Size

      36KB

    • MD5

      a6bd28e7277384379e9f4ce4155e3091

    • SHA1

      3b6c478ef4db3755949e81c48527737157a74645

    • SHA256

      e173aa2ba9a8fb339692cf8b908a284588c46e0be6772cd9983efc6e6205bd51

    • SHA512

      c39a621f505520243e4b247ab3c892962301901961278bb46fbc949dfa7efefa08389749c2fea4e8951adff8663181e546169dd1c0244096e9ae9df86c7ce380

    • SSDEEP

      768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJxUgKJOzjmiS1:tok3hbdlylKsgqopeJBWhZFGkE+cL2N7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks