General

  • Target

    f30ee574fdc3eee2014a4835e0dde7d1_JaffaCakes118

  • Size

    36KB

  • Sample

    240416-j19x9sda96

  • MD5

    f30ee574fdc3eee2014a4835e0dde7d1

  • SHA1

    2486ba1970fd392725e1eb2cf8a34bfbf6967b68

  • SHA256

    a8679cbeaac5502beb96694b3488fb273393678bb66595e31c7717810831037d

  • SHA512

    1e0e4cc738f0072222d3cea7b153f99e4442788dc3da5b83681de580a9203ede3fcd69dd6d60865ef8e9488e6608efa6bba4fd807acaa228e00a879b8059c522

  • SSDEEP

    768:nPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJAYbfBADoOS+Q5WJGwfn:Pok3hbdlylKsgqopeJBWhZFGkE+cL2NT

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      f30ee574fdc3eee2014a4835e0dde7d1_JaffaCakes118

    • Size

      36KB

    • MD5

      f30ee574fdc3eee2014a4835e0dde7d1

    • SHA1

      2486ba1970fd392725e1eb2cf8a34bfbf6967b68

    • SHA256

      a8679cbeaac5502beb96694b3488fb273393678bb66595e31c7717810831037d

    • SHA512

      1e0e4cc738f0072222d3cea7b153f99e4442788dc3da5b83681de580a9203ede3fcd69dd6d60865ef8e9488e6608efa6bba4fd807acaa228e00a879b8059c522

    • SSDEEP

      768:nPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJAYbfBADoOS+Q5WJGwfn:Pok3hbdlylKsgqopeJBWhZFGkE+cL2NT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks