General

  • Target

    f3a85350cfa7d90f5f284660987252b2_JaffaCakes118

  • Size

    36KB

  • Sample

    240416-rg4adaca29

  • MD5

    f3a85350cfa7d90f5f284660987252b2

  • SHA1

    a7a3910cbb4058f7d885362b5e15bde5c717044e

  • SHA256

    696e8e1073511bbf14f750398d83dd7d9ba4b276cf327cc6dc5fe37b4c0dad29

  • SHA512

    85fdffa890d0c29c8eba7002422b51c877a4bbcd8ba3ad96ce408effaead8c3a661153868859f48a226884291bef1e4aa1e2750287545696643551162e4b22f3

  • SSDEEP

    768:xPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ52wiBaMvoZka0x4bW:5ok3hbdlylKsgqopeJBWhZFGkE+cL2Nb

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      f3a85350cfa7d90f5f284660987252b2_JaffaCakes118

    • Size

      36KB

    • MD5

      f3a85350cfa7d90f5f284660987252b2

    • SHA1

      a7a3910cbb4058f7d885362b5e15bde5c717044e

    • SHA256

      696e8e1073511bbf14f750398d83dd7d9ba4b276cf327cc6dc5fe37b4c0dad29

    • SHA512

      85fdffa890d0c29c8eba7002422b51c877a4bbcd8ba3ad96ce408effaead8c3a661153868859f48a226884291bef1e4aa1e2750287545696643551162e4b22f3

    • SSDEEP

      768:xPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ52wiBaMvoZka0x4bW:5ok3hbdlylKsgqopeJBWhZFGkE+cL2Nb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks