General

  • Target

    f829fa7345646ec4f18f4c843dfdb8e6_JaffaCakes118

  • Size

    36KB

  • Sample

    240418-rgrxcafc52

  • MD5

    f829fa7345646ec4f18f4c843dfdb8e6

  • SHA1

    a071874978527cc363c1b99ea87465b2111addd9

  • SHA256

    4042117c5f0a3ad1634740b16d13fb621a8ec8a375cb2ae1b598af2afa300568

  • SHA512

    4f948009f30f56c3341dede113118e76c53cd83e1a40a209ba0caaf457cad31286a85ae48dee8a4fb264dfed32c00c8f4146d5e37c53af45042df2beeb813453

  • SSDEEP

    768:JPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJkLHAewnYsVzDZIQsqyi:Bok3hbdlylKsgqopeJBWhZFGkE+cL2Nq

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      f829fa7345646ec4f18f4c843dfdb8e6_JaffaCakes118

    • Size

      36KB

    • MD5

      f829fa7345646ec4f18f4c843dfdb8e6

    • SHA1

      a071874978527cc363c1b99ea87465b2111addd9

    • SHA256

      4042117c5f0a3ad1634740b16d13fb621a8ec8a375cb2ae1b598af2afa300568

    • SHA512

      4f948009f30f56c3341dede113118e76c53cd83e1a40a209ba0caaf457cad31286a85ae48dee8a4fb264dfed32c00c8f4146d5e37c53af45042df2beeb813453

    • SSDEEP

      768:JPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJkLHAewnYsVzDZIQsqyi:Bok3hbdlylKsgqopeJBWhZFGkE+cL2Nq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks