General

  • Target

    3e6b7d653af15f97a5e26823ed99f6b0bac6d5ebb812c4218dbb9e7929989d37

  • Size

    36KB

  • Sample

    230129-x25xlacb5t

  • MD5

    248db5be1d228a41495218fef2dc452f

  • SHA1

    93b169f8f787f4c6612dca9ee8d1f71c3cbdf64f

  • SHA256

    3e6b7d653af15f97a5e26823ed99f6b0bac6d5ebb812c4218dbb9e7929989d37

  • SHA512

    a337f2957ad446bff1a964983796cc336b885665fe125543ccb109c02490d4dee8f86b038b4ea5ee11e4f2dcba928761461906618959349770c75c27b9877257

  • SSDEEP

    768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJlXLapYWNn/YvGhb:tok3hbdlylKsgqopeJBWhZFGkE+cL2N9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      3e6b7d653af15f97a5e26823ed99f6b0bac6d5ebb812c4218dbb9e7929989d37

    • Size

      36KB

    • MD5

      248db5be1d228a41495218fef2dc452f

    • SHA1

      93b169f8f787f4c6612dca9ee8d1f71c3cbdf64f

    • SHA256

      3e6b7d653af15f97a5e26823ed99f6b0bac6d5ebb812c4218dbb9e7929989d37

    • SHA512

      a337f2957ad446bff1a964983796cc336b885665fe125543ccb109c02490d4dee8f86b038b4ea5ee11e4f2dcba928761461906618959349770c75c27b9877257

    • SSDEEP

      768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJlXLapYWNn/YvGhb:tok3hbdlylKsgqopeJBWhZFGkE+cL2N9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks