General

  • Target

    fc5df5f8cefd26cf60a21e7d65a4388e_JaffaCakes118

  • Size

    36KB

  • Sample

    240420-kmgv1acg74

  • MD5

    fc5df5f8cefd26cf60a21e7d65a4388e

  • SHA1

    81802a40c78e85c6e2bcf3a19ed28b1ba7eb3420

  • SHA256

    5c689ec795c7a184f1a8be2146d6af667936b8352ebedc90e4116efbcc93fd19

  • SHA512

    e8c69da6bda6ddb3cab0501bfd4b5478e0139a8cb492cece826e5bfe99ac182ccc02ab3dfff8897290c02c06af8952200a8eae7faf924cfa1195149e8b56a009

  • SSDEEP

    768:+PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJK4WxfRSy3CaC:Cok3hbdlylKsgqopeJBWhZFGkE+cL2Ny

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

xlm40.dropper

https://statedauto.com/wp-data.php

Targets

    • Target

      fc5df5f8cefd26cf60a21e7d65a4388e_JaffaCakes118

    • Size

      36KB

    • MD5

      fc5df5f8cefd26cf60a21e7d65a4388e

    • SHA1

      81802a40c78e85c6e2bcf3a19ed28b1ba7eb3420

    • SHA256

      5c689ec795c7a184f1a8be2146d6af667936b8352ebedc90e4116efbcc93fd19

    • SHA512

      e8c69da6bda6ddb3cab0501bfd4b5478e0139a8cb492cece826e5bfe99ac182ccc02ab3dfff8897290c02c06af8952200a8eae7faf924cfa1195149e8b56a009

    • SSDEEP

      768:+PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJK4WxfRSy3CaC:Cok3hbdlylKsgqopeJBWhZFGkE+cL2Ny

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks