General

  • Target

    a5499f4b5c28bc94e1fe2dfcd5a3a490feaee58d7f431d0231b61a7e3b180f87

  • Size

    35KB

  • Sample

    230129-x2s8sscb3s

  • MD5

    c26b81534d6d01ca5baf38b476f1f262

  • SHA1

    a891c30369b99939fb14cd4172663761f3dac8c0

  • SHA256

    a5499f4b5c28bc94e1fe2dfcd5a3a490feaee58d7f431d0231b61a7e3b180f87

  • SHA512

    a3da43e3a18d80b307adf2b03a2b0276e247758616e8ce0f44a896223708453ee372233695048d3923688a040e5d8e2f53f4eeaefd8ed62db222d1972b074b4e

  • SSDEEP

    768:/PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJoCd7w74TxC:3ok3hbdlylKsgqopeJBWhZFGkE+cL2Nn

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      a5499f4b5c28bc94e1fe2dfcd5a3a490feaee58d7f431d0231b61a7e3b180f87

    • Size

      35KB

    • MD5

      c26b81534d6d01ca5baf38b476f1f262

    • SHA1

      a891c30369b99939fb14cd4172663761f3dac8c0

    • SHA256

      a5499f4b5c28bc94e1fe2dfcd5a3a490feaee58d7f431d0231b61a7e3b180f87

    • SHA512

      a3da43e3a18d80b307adf2b03a2b0276e247758616e8ce0f44a896223708453ee372233695048d3923688a040e5d8e2f53f4eeaefd8ed62db222d1972b074b4e

    • SSDEEP

      768:/PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJoCd7w74TxC:3ok3hbdlylKsgqopeJBWhZFGkE+cL2Nn

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks