General

  • Target

    92c46d814f92721c90e0d8f8a6b91b8985efb6dc1528e1bc1cbfeaa31b7c5e95

  • Size

    36KB

  • Sample

    230129-x2yhhscb3z

  • MD5

    75e6c713562d36217cf8de842907abd7

  • SHA1

    8307d15bc62e3876b4ac60a83046e8ed61347a5d

  • SHA256

    92c46d814f92721c90e0d8f8a6b91b8985efb6dc1528e1bc1cbfeaa31b7c5e95

  • SHA512

    51a1ee1bea88eaaa94872df6285808646d2c53a044ad616e3b9f557f6a7adb8f83c2d5f932f9cfd8e6c10bcad5475d41696403cc2beef24eda0a68699c9aa70f

  • SSDEEP

    768:RPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJaIEcwzLocg82DO:Zok3hbdlylKsgqopeJBWhZFGkE+cL2Np

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      92c46d814f92721c90e0d8f8a6b91b8985efb6dc1528e1bc1cbfeaa31b7c5e95

    • Size

      36KB

    • MD5

      75e6c713562d36217cf8de842907abd7

    • SHA1

      8307d15bc62e3876b4ac60a83046e8ed61347a5d

    • SHA256

      92c46d814f92721c90e0d8f8a6b91b8985efb6dc1528e1bc1cbfeaa31b7c5e95

    • SHA512

      51a1ee1bea88eaaa94872df6285808646d2c53a044ad616e3b9f557f6a7adb8f83c2d5f932f9cfd8e6c10bcad5475d41696403cc2beef24eda0a68699c9aa70f

    • SSDEEP

      768:RPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJaIEcwzLocg82DO:Zok3hbdlylKsgqopeJBWhZFGkE+cL2Np

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks