General

  • Target

    f291ef6d1b4ec091149122c6e46ab064_JaffaCakes118

  • Size

    36KB

  • Sample

    240416-dwvpwsaa6z

  • MD5

    f291ef6d1b4ec091149122c6e46ab064

  • SHA1

    1c6f612b955eeb48cb469b5c96a59a14a96b77a3

  • SHA256

    446435da5ebad45fcefcaf901a8d83040afc1a2987eeacc12fc6cab077785b4a

  • SHA512

    b3aa4bff8a69e44bb6fff706725d6d17ca6acbd42f12274c540584d23538284b471a0c609a6e1a36ea5e0899fa56487689443362071efeff3bc6c1f06786a7b7

  • SSDEEP

    768:dPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJFZykTIITBurtaC:Vok3hbdlylKsgqopeJBWhZFGkE+cL2NP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      f291ef6d1b4ec091149122c6e46ab064_JaffaCakes118

    • Size

      36KB

    • MD5

      f291ef6d1b4ec091149122c6e46ab064

    • SHA1

      1c6f612b955eeb48cb469b5c96a59a14a96b77a3

    • SHA256

      446435da5ebad45fcefcaf901a8d83040afc1a2987eeacc12fc6cab077785b4a

    • SHA512

      b3aa4bff8a69e44bb6fff706725d6d17ca6acbd42f12274c540584d23538284b471a0c609a6e1a36ea5e0899fa56487689443362071efeff3bc6c1f06786a7b7

    • SSDEEP

      768:dPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJFZykTIITBurtaC:Vok3hbdlylKsgqopeJBWhZFGkE+cL2NP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks