General

  • Target

    b0d39718761128b2b9db8cbd76476550

  • Size

    36KB

  • Sample

    240304-a96sjadd2s

  • MD5

    b0d39718761128b2b9db8cbd76476550

  • SHA1

    6b396f0ab260f83840e56e5676532d682f6e8bd9

  • SHA256

    0b0e362da87b2b9b48482140ee44beafaf66bdd1b25fe8e0fac852adedf23d29

  • SHA512

    3b08cdf5a5002f3f59bff7eaaae29317598f904eace57bf016bb15c7b026ac1f224e599b1f8e2bcdf51f4ac279410454d26b6ecb26c2cc1579f941c5f1d4064c

  • SSDEEP

    768:RPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJJvvT26dgNV:Zok3hbdlylKsgqopeJBWhZFGkE+cL2Nf

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      b0d39718761128b2b9db8cbd76476550

    • Size

      36KB

    • MD5

      b0d39718761128b2b9db8cbd76476550

    • SHA1

      6b396f0ab260f83840e56e5676532d682f6e8bd9

    • SHA256

      0b0e362da87b2b9b48482140ee44beafaf66bdd1b25fe8e0fac852adedf23d29

    • SHA512

      3b08cdf5a5002f3f59bff7eaaae29317598f904eace57bf016bb15c7b026ac1f224e599b1f8e2bcdf51f4ac279410454d26b6ecb26c2cc1579f941c5f1d4064c

    • SSDEEP

      768:RPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJJvvT26dgNV:Zok3hbdlylKsgqopeJBWhZFGkE+cL2Nf

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks