General

  • Target

    635f07941b083edd117f2a18bc3ea6b10bc6a3fddfc76ad066ae3b736b76fe98

  • Size

    35KB

  • Sample

    230129-x21mwacb4v

  • MD5

    5092cdcd2c79cacca713c5e217c18a9d

  • SHA1

    079e6db81a82873c39cf90ad4350c7dd87d52756

  • SHA256

    635f07941b083edd117f2a18bc3ea6b10bc6a3fddfc76ad066ae3b736b76fe98

  • SHA512

    906c13612750d2f841563a8b78813308911d7c5714e92e0e9a339ab1dc71e4e9508f698a4a89fd9cc7e6315f7caaea6847f65ced3c5a7db3bab5674d42c4685a

  • SSDEEP

    768:TPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJA5ebA9uSynVWENU:Lok3hbdlylKsgqopeJBWhZFGkE+cL2NR

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      635f07941b083edd117f2a18bc3ea6b10bc6a3fddfc76ad066ae3b736b76fe98

    • Size

      35KB

    • MD5

      5092cdcd2c79cacca713c5e217c18a9d

    • SHA1

      079e6db81a82873c39cf90ad4350c7dd87d52756

    • SHA256

      635f07941b083edd117f2a18bc3ea6b10bc6a3fddfc76ad066ae3b736b76fe98

    • SHA512

      906c13612750d2f841563a8b78813308911d7c5714e92e0e9a339ab1dc71e4e9508f698a4a89fd9cc7e6315f7caaea6847f65ced3c5a7db3bab5674d42c4685a

    • SSDEEP

      768:TPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJA5ebA9uSynVWENU:Lok3hbdlylKsgqopeJBWhZFGkE+cL2NR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks