General

  • Target

    08917d2db7ea168cde0eb7b902e8252ee9dbc35407ab32e969082642c0b1111a

  • Size

    36KB

  • Sample

    230129-x3bp5saf99

  • MD5

    5c323bb8590c4256bd431c29556243a3

  • SHA1

    af281144eb521637a068c03e4ae13e490554c866

  • SHA256

    08917d2db7ea168cde0eb7b902e8252ee9dbc35407ab32e969082642c0b1111a

  • SHA512

    7bbe158654573104bc2e284dfdc72c2980d30cdaae80298574b50196315ae99b7af14a73293a991de3eaf5db70b097e6c9a2ed1c8b1c1a62e421e81229a518c5

  • SSDEEP

    768:xPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ0vjA5GK0Zh+kZQh:5ok3hbdlylKsgqopeJBWhZFGkE+cL2NO

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      08917d2db7ea168cde0eb7b902e8252ee9dbc35407ab32e969082642c0b1111a

    • Size

      36KB

    • MD5

      5c323bb8590c4256bd431c29556243a3

    • SHA1

      af281144eb521637a068c03e4ae13e490554c866

    • SHA256

      08917d2db7ea168cde0eb7b902e8252ee9dbc35407ab32e969082642c0b1111a

    • SHA512

      7bbe158654573104bc2e284dfdc72c2980d30cdaae80298574b50196315ae99b7af14a73293a991de3eaf5db70b097e6c9a2ed1c8b1c1a62e421e81229a518c5

    • SSDEEP

      768:xPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ0vjA5GK0Zh+kZQh:5ok3hbdlylKsgqopeJBWhZFGkE+cL2NO

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks