General

  • Target

    f2cc4812da526e8158c9cda5cd001a16_JaffaCakes118

  • Size

    36KB

  • Sample

    240416-f986jsae75

  • MD5

    f2cc4812da526e8158c9cda5cd001a16

  • SHA1

    94127e60bfd3dae7df2abc4c740f43b632e0da49

  • SHA256

    1d8408eb9ee03a971c33994360fe9124df1976de5522abaec0863423eaf8fb33

  • SHA512

    219af6d0c2e8587ae974d6282847104c7967132fe4b808ea3edba43a6319ed833a606ef1079f2cacb52bebb632120058d14f8eda8a80ea5eacd9dcc3e4df5592

  • SSDEEP

    768:dPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ7veZdAen1JtbOl3JqhLwQ:Vok3hbdlylKsgqopeJBWhZFGkE+cL2N/

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      f2cc4812da526e8158c9cda5cd001a16_JaffaCakes118

    • Size

      36KB

    • MD5

      f2cc4812da526e8158c9cda5cd001a16

    • SHA1

      94127e60bfd3dae7df2abc4c740f43b632e0da49

    • SHA256

      1d8408eb9ee03a971c33994360fe9124df1976de5522abaec0863423eaf8fb33

    • SHA512

      219af6d0c2e8587ae974d6282847104c7967132fe4b808ea3edba43a6319ed833a606ef1079f2cacb52bebb632120058d14f8eda8a80ea5eacd9dcc3e4df5592

    • SSDEEP

      768:dPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ7veZdAen1JtbOl3JqhLwQ:Vok3hbdlylKsgqopeJBWhZFGkE+cL2N/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks