General

  • Target

    5f03925789043d170477e89f4a4be180

  • Size

    36KB

  • Sample

    231219-t345xahde8

  • MD5

    5f03925789043d170477e89f4a4be180

  • SHA1

    e1f6791e293c832bb983665f4ee99edef800984a

  • SHA256

    208e60ef7289ca198e1894e88051b3e909add9ebd62bad791b884f90b6259f05

  • SHA512

    328b6a39567376b3ca68eec4eec96d1c1f68bad3b4fed4620612c33fdffc744d1866e97757f465448edbabe27106c4214d8fce3edddb931a66bad81b9cc1b50c

  • SSDEEP

    768:oPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJViuT8uVnR3P2QkT1PLXQsgv:Eok3hbdlylKsgqopeJBWhZFGkE+cL2NS

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      5f03925789043d170477e89f4a4be180

    • Size

      36KB

    • MD5

      5f03925789043d170477e89f4a4be180

    • SHA1

      e1f6791e293c832bb983665f4ee99edef800984a

    • SHA256

      208e60ef7289ca198e1894e88051b3e909add9ebd62bad791b884f90b6259f05

    • SHA512

      328b6a39567376b3ca68eec4eec96d1c1f68bad3b4fed4620612c33fdffc744d1866e97757f465448edbabe27106c4214d8fce3edddb931a66bad81b9cc1b50c

    • SSDEEP

      768:oPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJViuT8uVnR3P2QkT1PLXQsgv:Eok3hbdlylKsgqopeJBWhZFGkE+cL2NS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks