General

  • Target

    f8bd3c506549bc43389dbf7d25052497_JaffaCakes118

  • Size

    35KB

  • Sample

    240418-zvrshaeg65

  • MD5

    f8bd3c506549bc43389dbf7d25052497

  • SHA1

    d52c12cc2ef1a231ec21a004290686b2e13d935d

  • SHA256

    1d801298e555fc149056e09cf4d82fcd013e48515b5631f00c16af904ea81f76

  • SHA512

    a16088e30eacfa52a704ca8e57beb53a321a8334d7ad639028cc1827646f0c223b0b8068631543473a62087886a9edb065ff76c0585b5631747dfa9cc57d669f

  • SSDEEP

    768:TPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhzxhR3BhjwbM7FC:Lok3hbdlylKsgqopeJBWhZFGkE+cL2NP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      f8bd3c506549bc43389dbf7d25052497_JaffaCakes118

    • Size

      35KB

    • MD5

      f8bd3c506549bc43389dbf7d25052497

    • SHA1

      d52c12cc2ef1a231ec21a004290686b2e13d935d

    • SHA256

      1d801298e555fc149056e09cf4d82fcd013e48515b5631f00c16af904ea81f76

    • SHA512

      a16088e30eacfa52a704ca8e57beb53a321a8334d7ad639028cc1827646f0c223b0b8068631543473a62087886a9edb065ff76c0585b5631747dfa9cc57d669f

    • SSDEEP

      768:TPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJhzxhR3BhjwbM7FC:Lok3hbdlylKsgqopeJBWhZFGkE+cL2NP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks