General

  • Target

    f660b487ca2bd2df8c740ca29c55a181_JaffaCakes118

  • Size

    36KB

  • Sample

    240417-wvax7sba9z

  • MD5

    f660b487ca2bd2df8c740ca29c55a181

  • SHA1

    afd376996874fe4b9452b5c208b63ce6b0cc8324

  • SHA256

    b7edab6aa1db14fc8b4f2f0b2f36272b83dc4f37fdc92141f34b602381c2f814

  • SHA512

    51739ab98cda8f238714c9cf1aff6ccd5905d121ea86d6a71dafe72e723925476e135267977bcca1f30f667c157b41920b3e95a09781117bc9166777b8b69ce5

  • SSDEEP

    768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJtIvoovqjZU:dok3hbdlylKsgqopeJBWhZFGkE+cL2Nl

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      f660b487ca2bd2df8c740ca29c55a181_JaffaCakes118

    • Size

      36KB

    • MD5

      f660b487ca2bd2df8c740ca29c55a181

    • SHA1

      afd376996874fe4b9452b5c208b63ce6b0cc8324

    • SHA256

      b7edab6aa1db14fc8b4f2f0b2f36272b83dc4f37fdc92141f34b602381c2f814

    • SHA512

      51739ab98cda8f238714c9cf1aff6ccd5905d121ea86d6a71dafe72e723925476e135267977bcca1f30f667c157b41920b3e95a09781117bc9166777b8b69ce5

    • SSDEEP

      768:VPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJtIvoovqjZU:dok3hbdlylKsgqopeJBWhZFGkE+cL2Nl

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks