General

  • Target

    7a5007785ba11a0fd7bf907798601308ba34f451e5b3580780090ac4b75925f1

  • Size

    36KB

  • Sample

    221130-q9hzgaac5v

  • MD5

    645e818659757ba49a67bcb5f4d441a9

  • SHA1

    08eb6b50926bd827b6b11bace5cb29c47fd4f5be

  • SHA256

    7a5007785ba11a0fd7bf907798601308ba34f451e5b3580780090ac4b75925f1

  • SHA512

    0edc583274b45e4fa66964cf33917e79158314b8ffd537127d87e64290b67b81a3a10e00bc0c389c70234d25eef255911010bda99bd0fc656ecf86362dd63176

  • SSDEEP

    768:JPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJapYsnMhiQcka7:Bok3hbdlylKsgqopeJBWhZFGkE+cL2ND

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      7a5007785ba11a0fd7bf907798601308ba34f451e5b3580780090ac4b75925f1

    • Size

      36KB

    • MD5

      645e818659757ba49a67bcb5f4d441a9

    • SHA1

      08eb6b50926bd827b6b11bace5cb29c47fd4f5be

    • SHA256

      7a5007785ba11a0fd7bf907798601308ba34f451e5b3580780090ac4b75925f1

    • SHA512

      0edc583274b45e4fa66964cf33917e79158314b8ffd537127d87e64290b67b81a3a10e00bc0c389c70234d25eef255911010bda99bd0fc656ecf86362dd63176

    • SSDEEP

      768:JPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJapYsnMhiQcka7:Bok3hbdlylKsgqopeJBWhZFGkE+cL2ND

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks