General

  • Target

    b0fd0210856bcb67118cba0e2a49ab36

  • Size

    36KB

  • Sample

    240304-cvw1wsgc76

  • MD5

    b0fd0210856bcb67118cba0e2a49ab36

  • SHA1

    396175f90a3ccbaca2eb5b5826eae1cd82a9f455

  • SHA256

    0bb56f0acc063a5276cc2982677e0bb7a167e9387482dc128ce0c68fa710d2db

  • SHA512

    6a3f5973471247efc1135dcc323762d51ec2b6d943c9a6294d6882ba9712403420bc3aebe06b5cd6c54b3e29801789fbf61302e7b72b0a33984143d11ae56022

  • SSDEEP

    768:OPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJXRFunfVzKorPicO5c+6WyS:yok3hbdlylKsgqopeJBWhZFGkE+cL2Ny

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

xlm40.dropper

https://statedauto.com/wp-data.php

Targets

    • Target

      b0fd0210856bcb67118cba0e2a49ab36

    • Size

      36KB

    • MD5

      b0fd0210856bcb67118cba0e2a49ab36

    • SHA1

      396175f90a3ccbaca2eb5b5826eae1cd82a9f455

    • SHA256

      0bb56f0acc063a5276cc2982677e0bb7a167e9387482dc128ce0c68fa710d2db

    • SHA512

      6a3f5973471247efc1135dcc323762d51ec2b6d943c9a6294d6882ba9712403420bc3aebe06b5cd6c54b3e29801789fbf61302e7b72b0a33984143d11ae56022

    • SSDEEP

      768:OPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJXRFunfVzKorPicO5c+6WyS:yok3hbdlylKsgqopeJBWhZFGkE+cL2Ny

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks