General

  • Target

    0a4dc6cba72c076b488292563dd03c79da543f8ee513addc28c20ef2b5126db2

  • Size

    36KB

  • Sample

    230129-x3asvacb6s

  • MD5

    4ae80c556b4f62281fb3f0ff310e448b

  • SHA1

    6f5d94a330a0557beda1f377a6e96441c8da7eb9

  • SHA256

    0a4dc6cba72c076b488292563dd03c79da543f8ee513addc28c20ef2b5126db2

  • SHA512

    6bd33fdc9c9f9c3b97c7940136d17d8a03985b2be7e75c7f6480fbccebdae5b88b15d87830b835d68c593a555894754781827d435c7d4176451d7a7b625b5527

  • SSDEEP

    768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJD0cBvA0HCQlS3XB1l/hjuN6:tok3hbdlylKsgqopeJBWhZFGkE+cL2Nd

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      0a4dc6cba72c076b488292563dd03c79da543f8ee513addc28c20ef2b5126db2

    • Size

      36KB

    • MD5

      4ae80c556b4f62281fb3f0ff310e448b

    • SHA1

      6f5d94a330a0557beda1f377a6e96441c8da7eb9

    • SHA256

      0a4dc6cba72c076b488292563dd03c79da543f8ee513addc28c20ef2b5126db2

    • SHA512

      6bd33fdc9c9f9c3b97c7940136d17d8a03985b2be7e75c7f6480fbccebdae5b88b15d87830b835d68c593a555894754781827d435c7d4176451d7a7b625b5527

    • SSDEEP

      768:FPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJD0cBvA0HCQlS3XB1l/hjuN6:tok3hbdlylKsgqopeJBWhZFGkE+cL2Nd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks