General

  • Target

    81308239aa682cfa6e4f44c33ee5b5aa

  • Size

    36KB

  • Sample

    231219-xyf43adca9

  • MD5

    81308239aa682cfa6e4f44c33ee5b5aa

  • SHA1

    333ebdc3b349ff071fb6d75ac4d26c05d950e4d6

  • SHA256

    5e3165808876b9758310f6cfaac16a5d37c72afdb55b286454c1abe75a6822fa

  • SHA512

    5f70b8c762b2f3eb74590d8a3062d907483b4813c5547fc9dad17639a3036444ef345ea56d8db02e757bd7947f4a33df18a60de2bb948d593198ef64bbef3b47

  • SSDEEP

    768:zPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJVqZUDGp35k16uZyBh3VUz:rok3hbdlylKsgqopeJBWhZFGkE+cL2NS

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      81308239aa682cfa6e4f44c33ee5b5aa

    • Size

      36KB

    • MD5

      81308239aa682cfa6e4f44c33ee5b5aa

    • SHA1

      333ebdc3b349ff071fb6d75ac4d26c05d950e4d6

    • SHA256

      5e3165808876b9758310f6cfaac16a5d37c72afdb55b286454c1abe75a6822fa

    • SHA512

      5f70b8c762b2f3eb74590d8a3062d907483b4813c5547fc9dad17639a3036444ef345ea56d8db02e757bd7947f4a33df18a60de2bb948d593198ef64bbef3b47

    • SSDEEP

      768:zPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJVqZUDGp35k16uZyBh3VUz:rok3hbdlylKsgqopeJBWhZFGkE+cL2NS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks