General

  • Target

    f188aeff03b3f7058cd988564f15e280_JaffaCakes118

  • Size

    36KB

  • Sample

    240415-vfc9cabc97

  • MD5

    f188aeff03b3f7058cd988564f15e280

  • SHA1

    bdb5b379186863a2fcf962a886b4447b2bac58ec

  • SHA256

    59471ede5b99902ff19bf1f7ffc5d709ad7cc2653fc7d9d770e8c7592c63e191

  • SHA512

    16a7237ffa07e1f2c9832efb7358ac0a59777f585744ae531af22a8293bc32d8af969211f0012ee8af04df169e0f4b4a7f9902565e0a5aca37f3e10f4da3f9da

  • SSDEEP

    768:nPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJU7EZQvDjEm4DwY:Pok3hbdlylKsgqopeJBWhZFGkE+cL2NM

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

xlm40.dropper

https://statedauto.com/wp-data.php

Targets

    • Target

      f188aeff03b3f7058cd988564f15e280_JaffaCakes118

    • Size

      36KB

    • MD5

      f188aeff03b3f7058cd988564f15e280

    • SHA1

      bdb5b379186863a2fcf962a886b4447b2bac58ec

    • SHA256

      59471ede5b99902ff19bf1f7ffc5d709ad7cc2653fc7d9d770e8c7592c63e191

    • SHA512

      16a7237ffa07e1f2c9832efb7358ac0a59777f585744ae531af22a8293bc32d8af969211f0012ee8af04df169e0f4b4a7f9902565e0a5aca37f3e10f4da3f9da

    • SSDEEP

      768:nPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJU7EZQvDjEm4DwY:Pok3hbdlylKsgqopeJBWhZFGkE+cL2NM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks