General

  • Target

    5cf81b88b6829c47f85d967f330489b44603e337d500905eababbc29ef95ad5f

  • Size

    36KB

  • Sample

    230129-x23ggaaf94

  • MD5

    38a4ba177314552216683a3b00ea11e5

  • SHA1

    f9ff2bec229ee5c4c42931a17917156e88fb20a9

  • SHA256

    5cf81b88b6829c47f85d967f330489b44603e337d500905eababbc29ef95ad5f

  • SHA512

    e813bb6486b2c293b15bf78bc6b206d5a1e4e8933d6cf8c4ce6c9455a740b2b9d4aea9d9ddd295e0ce776ab9fea68e6cd69387b44e9571b700d333d2bdbb298f

  • SSDEEP

    768:3PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJRSOhuJD6eFluuXvM:/ok3hbdlylKsgqopeJBWhZFGkE+cL2N+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      5cf81b88b6829c47f85d967f330489b44603e337d500905eababbc29ef95ad5f

    • Size

      36KB

    • MD5

      38a4ba177314552216683a3b00ea11e5

    • SHA1

      f9ff2bec229ee5c4c42931a17917156e88fb20a9

    • SHA256

      5cf81b88b6829c47f85d967f330489b44603e337d500905eababbc29ef95ad5f

    • SHA512

      e813bb6486b2c293b15bf78bc6b206d5a1e4e8933d6cf8c4ce6c9455a740b2b9d4aea9d9ddd295e0ce776ab9fea68e6cd69387b44e9571b700d333d2bdbb298f

    • SSDEEP

      768:3PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJRSOhuJD6eFluuXvM:/ok3hbdlylKsgqopeJBWhZFGkE+cL2N+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks