General

  • Target

    4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f

  • Size

    42KB

  • Sample

    241213-1r52dsyrgy

  • MD5

    6f01662ba35628594a94940a1d11987e

  • SHA1

    fb16c6fa665e2e609ec5a7e56fa1aa1850f29809

  • SHA256

    4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f

  • SHA512

    ab260a52705adcc2121212e2a169fa953bd296b6acdf9b8bd6bce0e72c17a8e52657c4ea0cd460fdfcc7dc730aeae089ef1ca612cd8befd643a09054ce9b370b

  • SSDEEP

    768:dPXk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJrVbQvU0TQmSoxF9ovmNje:VXk3hbdlylKsgqopeJBWhZFGkE+cL2NY

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://topic.yoga/wp-data.php

xlm40.dropper

https://topic.miami/wp-data.php

Targets

    • Target

      4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f

    • Size

      42KB

    • MD5

      6f01662ba35628594a94940a1d11987e

    • SHA1

      fb16c6fa665e2e609ec5a7e56fa1aa1850f29809

    • SHA256

      4fb9fe1d6aef3566205ec593349d9523c6a60101513a8b0a6a9665cec282d63f

    • SHA512

      ab260a52705adcc2121212e2a169fa953bd296b6acdf9b8bd6bce0e72c17a8e52657c4ea0cd460fdfcc7dc730aeae089ef1ca612cd8befd643a09054ce9b370b

    • SSDEEP

      768:dPXk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJrVbQvU0TQmSoxF9ovmNje:VXk3hbdlylKsgqopeJBWhZFGkE+cL2NY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks