General

  • Target

    f8c8c8b69842e680d794797ce5d0a0e3_JaffaCakes118

  • Size

    36KB

  • Sample

    240418-1a114sgd9s

  • MD5

    f8c8c8b69842e680d794797ce5d0a0e3

  • SHA1

    7a2595663d2c567e1a8cfc5a1833f9c1bab0f311

  • SHA256

    ea6166c3d77b2971725dfe88fd2f655d479b64e722ba54b5dabfb7c108c0cb4d

  • SHA512

    1cc4e2faf9382c5999e51f22fc06aa17d5d48d1a1b27be0edf1a53e613942f13c32f2cf4b49ca15e69d5c66a3644d3e468e029a7db3b6cfc16962fb0393262f4

  • SSDEEP

    768:MPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJow/zKsgRALGr2JC+cmJ:Yok3hbdlylKsgqopeJBWhZFGkE+cL2N8

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

Targets

    • Target

      f8c8c8b69842e680d794797ce5d0a0e3_JaffaCakes118

    • Size

      36KB

    • MD5

      f8c8c8b69842e680d794797ce5d0a0e3

    • SHA1

      7a2595663d2c567e1a8cfc5a1833f9c1bab0f311

    • SHA256

      ea6166c3d77b2971725dfe88fd2f655d479b64e722ba54b5dabfb7c108c0cb4d

    • SHA512

      1cc4e2faf9382c5999e51f22fc06aa17d5d48d1a1b27be0edf1a53e613942f13c32f2cf4b49ca15e69d5c66a3644d3e468e029a7db3b6cfc16962fb0393262f4

    • SSDEEP

      768:MPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJow/zKsgRALGr2JC+cmJ:Yok3hbdlylKsgqopeJBWhZFGkE+cL2N8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks