General

  • Target

    b6463aaf30524002d3dce313e90a0381

  • Size

    36KB

  • Sample

    240306-cv5m2agf4t

  • MD5

    b6463aaf30524002d3dce313e90a0381

  • SHA1

    04966b627a3c49e890c86e1e3560ce85bdad9664

  • SHA256

    cae86f705f11c8dd9187637cdcab1970eca459c99603e064eb4e02f7b313054d

  • SHA512

    9884a5fce3c9c95da1c75ab950bf6b3288ad962149a78ab2fb6aa669b6b2f7256fac0a52011b53867e7c3c3bd5a1244cc81f87ec1a60fac0a66fc83426141285

  • SSDEEP

    768:TPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ7bENSrGzOgN5FlGDlzn:Lok3hbdlylKsgqopeJBWhZFGkE+cL2Ng

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      b6463aaf30524002d3dce313e90a0381

    • Size

      36KB

    • MD5

      b6463aaf30524002d3dce313e90a0381

    • SHA1

      04966b627a3c49e890c86e1e3560ce85bdad9664

    • SHA256

      cae86f705f11c8dd9187637cdcab1970eca459c99603e064eb4e02f7b313054d

    • SHA512

      9884a5fce3c9c95da1c75ab950bf6b3288ad962149a78ab2fb6aa669b6b2f7256fac0a52011b53867e7c3c3bd5a1244cc81f87ec1a60fac0a66fc83426141285

    • SSDEEP

      768:TPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ7bENSrGzOgN5FlGDlzn:Lok3hbdlylKsgqopeJBWhZFGkE+cL2Ng

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks