General

  • Target

    0a452a45e781a7ff0348f618f594dfcdb0a83ef22b9120aba5a006862ee4893d

  • Size

    36KB

  • Sample

    230129-x3bedaaf98

  • MD5

    7693610a8fb10370d9fd6f2f53157fe0

  • SHA1

    93aa8e85f2fe437a7d1e7f30c693e9854aadec49

  • SHA256

    0a452a45e781a7ff0348f618f594dfcdb0a83ef22b9120aba5a006862ee4893d

  • SHA512

    9bea01393333aee180eb49f52736c0b053daabb02c202f288b6e2525e07a45e20bf6f7a1ee340d689b9f2341e3a04e3f104eed2ceaf5fe7b408633882e969cce

  • SSDEEP

    768:xPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJp9Ajxr8Itd5lsr1zVJR:5ok3hbdlylKsgqopeJBWhZFGkE+cL2Ny

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      0a452a45e781a7ff0348f618f594dfcdb0a83ef22b9120aba5a006862ee4893d

    • Size

      36KB

    • MD5

      7693610a8fb10370d9fd6f2f53157fe0

    • SHA1

      93aa8e85f2fe437a7d1e7f30c693e9854aadec49

    • SHA256

      0a452a45e781a7ff0348f618f594dfcdb0a83ef22b9120aba5a006862ee4893d

    • SHA512

      9bea01393333aee180eb49f52736c0b053daabb02c202f288b6e2525e07a45e20bf6f7a1ee340d689b9f2341e3a04e3f104eed2ceaf5fe7b408633882e969cce

    • SSDEEP

      768:xPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJp9Ajxr8Itd5lsr1zVJR:5ok3hbdlylKsgqopeJBWhZFGkE+cL2Ny

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks