General

  • Target

    6d17600087dad0443aedaef0f7a802af

  • Size

    36KB

  • Sample

    231219-wagv1shfh6

  • MD5

    6d17600087dad0443aedaef0f7a802af

  • SHA1

    1c761be5e40cc751ad9938f8131bc7ca82959017

  • SHA256

    d78042b9c0e573779945fcc5f295a3b21d69f65bc7931b3477127d0aadd529b9

  • SHA512

    704e276c3f95b278aac0df8c910bd840734a5211171f18637aeb78f67872e27ac5e3aed4a773dd4327bf56455ee501e40134023c01de98c29bd4298a3165e8dd

  • SSDEEP

    768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJgxVYx803xaYg8D9WugJkwA:dok3hbdlylKsgqopeJBWhZFGkE+cL2NA

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      6d17600087dad0443aedaef0f7a802af

    • Size

      36KB

    • MD5

      6d17600087dad0443aedaef0f7a802af

    • SHA1

      1c761be5e40cc751ad9938f8131bc7ca82959017

    • SHA256

      d78042b9c0e573779945fcc5f295a3b21d69f65bc7931b3477127d0aadd529b9

    • SHA512

      704e276c3f95b278aac0df8c910bd840734a5211171f18637aeb78f67872e27ac5e3aed4a773dd4327bf56455ee501e40134023c01de98c29bd4298a3165e8dd

    • SSDEEP

      768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJgxVYx803xaYg8D9WugJkwA:dok3hbdlylKsgqopeJBWhZFGkE+cL2NA

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks