General

  • Target

    82f59dc2e7152bf4b637a335f8b3cbab

  • Size

    36KB

  • Sample

    231219-x3vg9aecg3

  • MD5

    82f59dc2e7152bf4b637a335f8b3cbab

  • SHA1

    1640f6b2ce8ed988493fd7a34841b742e8491549

  • SHA256

    9ca136785e2e475a747d63739c293fd1a49390dd859b3933658fb13708d97d88

  • SHA512

    2d9418ad8981d4433674b8e3cb3dbbac2806a727c859c27c37ddb4d23a5bec11181fc225daed059fa85ba89243cd10127ed42b633aeb639278b334dec69d6f9c

  • SSDEEP

    768:NPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJTR58pjZ0WxVbkh:lok3hbdlylKsgqopeJBWhZFGkE+cL2NU

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      82f59dc2e7152bf4b637a335f8b3cbab

    • Size

      36KB

    • MD5

      82f59dc2e7152bf4b637a335f8b3cbab

    • SHA1

      1640f6b2ce8ed988493fd7a34841b742e8491549

    • SHA256

      9ca136785e2e475a747d63739c293fd1a49390dd859b3933658fb13708d97d88

    • SHA512

      2d9418ad8981d4433674b8e3cb3dbbac2806a727c859c27c37ddb4d23a5bec11181fc225daed059fa85ba89243cd10127ed42b633aeb639278b334dec69d6f9c

    • SSDEEP

      768:NPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJTR58pjZ0WxVbkh:lok3hbdlylKsgqopeJBWhZFGkE+cL2NU

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks