General

  • Target

    f433613db84204a654ae9ce35a76149d_JaffaCakes118

  • Size

    36KB

  • Sample

    240416-yg1mtaah48

  • MD5

    f433613db84204a654ae9ce35a76149d

  • SHA1

    0a8043d0a89227298d47a52dd2ffe33bd3ca9092

  • SHA256

    84f5728ea9d48b7a88d55be3aa201de8cdbe8321d172c9f1cd950508332d2deb

  • SHA512

    1bb512aafb3c47c65325b54b8bfe43aab640666b554dbc74c81ad4a5cb33dc35a26c3f6a337882705ce93750ffea4092259bf26f0a9fa1cbbe8e5612d5162680

  • SSDEEP

    768:BPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ4Ai89mTtUpWzgpF:pok3hbdlylKsgqopeJBWhZFGkE+cL2NY

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      f433613db84204a654ae9ce35a76149d_JaffaCakes118

    • Size

      36KB

    • MD5

      f433613db84204a654ae9ce35a76149d

    • SHA1

      0a8043d0a89227298d47a52dd2ffe33bd3ca9092

    • SHA256

      84f5728ea9d48b7a88d55be3aa201de8cdbe8321d172c9f1cd950508332d2deb

    • SHA512

      1bb512aafb3c47c65325b54b8bfe43aab640666b554dbc74c81ad4a5cb33dc35a26c3f6a337882705ce93750ffea4092259bf26f0a9fa1cbbe8e5612d5162680

    • SSDEEP

      768:BPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJ4Ai89mTtUpWzgpF:pok3hbdlylKsgqopeJBWhZFGkE+cL2NY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks