General

  • Target

    e59bfe89e951475de9379dc84f2f7d69

  • Size

    36KB

  • Sample

    231220-ttetnaaaaj

  • MD5

    e59bfe89e951475de9379dc84f2f7d69

  • SHA1

    fa41c40eab8461dd83bbeb7ce6ffce4994466035

  • SHA256

    337c03a0e52e0f1d9638bbe922f02a64058359e4ac8610285c07320e234e6750

  • SHA512

    e807e2619c1034fe40e5d08e9057a37a6c6e7046981bd4f1bccbc3384183be13c82b8dcb1e0443391dfe91e043ea2c0a00cb25c1014a250777eca0c4a4639b7d

  • SSDEEP

    768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJEopWQ7fTSVkHZ8/:dok3hbdlylKsgqopeJBWhZFGkE+cL2Nh

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      e59bfe89e951475de9379dc84f2f7d69

    • Size

      36KB

    • MD5

      e59bfe89e951475de9379dc84f2f7d69

    • SHA1

      fa41c40eab8461dd83bbeb7ce6ffce4994466035

    • SHA256

      337c03a0e52e0f1d9638bbe922f02a64058359e4ac8610285c07320e234e6750

    • SHA512

      e807e2619c1034fe40e5d08e9057a37a6c6e7046981bd4f1bccbc3384183be13c82b8dcb1e0443391dfe91e043ea2c0a00cb25c1014a250777eca0c4a4639b7d

    • SSDEEP

      768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJEopWQ7fTSVkHZ8/:dok3hbdlylKsgqopeJBWhZFGkE+cL2Nh

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks