General

  • Target

    ce0f34a451afcd323c0d54e8487e0a47

  • Size

    36KB

  • Sample

    240316-pm5z2sah81

  • MD5

    ce0f34a451afcd323c0d54e8487e0a47

  • SHA1

    c77da7d93fa82a4d4e60174c4c6f280b2a2fcfb1

  • SHA256

    4462ef15c4f1a56056467efde11effada3c20c593a9a389cef993f3531937e9f

  • SHA512

    b6aee8f0c8c4a034931bac9d362c753e2f44d6baa15bcc9869550fef70772070ee0f67c49fee3ed0face398de63e3cfcb80e6d3b92efd1672b0a597265b42df7

  • SSDEEP

    768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJv6MRWZxX8teR2FjBSs:dok3hbdlylKsgqopeJBWhZFGkE+cL2Ng

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      ce0f34a451afcd323c0d54e8487e0a47

    • Size

      36KB

    • MD5

      ce0f34a451afcd323c0d54e8487e0a47

    • SHA1

      c77da7d93fa82a4d4e60174c4c6f280b2a2fcfb1

    • SHA256

      4462ef15c4f1a56056467efde11effada3c20c593a9a389cef993f3531937e9f

    • SHA512

      b6aee8f0c8c4a034931bac9d362c753e2f44d6baa15bcc9869550fef70772070ee0f67c49fee3ed0face398de63e3cfcb80e6d3b92efd1672b0a597265b42df7

    • SSDEEP

      768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJv6MRWZxX8teR2FjBSs:dok3hbdlylKsgqopeJBWhZFGkE+cL2Ng

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks