General

  • Target

    fd927221ac3c64708c772635ddf198f3_JaffaCakes118

  • Size

    36KB

  • Sample

    240420-y6wp6ahb27

  • MD5

    fd927221ac3c64708c772635ddf198f3

  • SHA1

    cee184e40281a28769d41da33eb2a0ea03f9dccb

  • SHA256

    a45fc7048cfd7e4f1c6aae467272ccb770bef9aa1c0aef59a39b97a1c804170d

  • SHA512

    9eb5f2762478d6c3230b444cbec0270b524e5f291ec34212f70ee3e2fd739b67cbdc5370748dd4fb906a3880f41b7597d783482a4eb6f54a4d14223a75ac0d9e

  • SSDEEP

    768:iPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJluoVOfNn6V80PcvT:Gok3hbdlylKsgqopeJBWhZFGkE+cL2N9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      fd927221ac3c64708c772635ddf198f3_JaffaCakes118

    • Size

      36KB

    • MD5

      fd927221ac3c64708c772635ddf198f3

    • SHA1

      cee184e40281a28769d41da33eb2a0ea03f9dccb

    • SHA256

      a45fc7048cfd7e4f1c6aae467272ccb770bef9aa1c0aef59a39b97a1c804170d

    • SHA512

      9eb5f2762478d6c3230b444cbec0270b524e5f291ec34212f70ee3e2fd739b67cbdc5370748dd4fb906a3880f41b7597d783482a4eb6f54a4d14223a75ac0d9e

    • SSDEEP

      768:iPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJluoVOfNn6V80PcvT:Gok3hbdlylKsgqopeJBWhZFGkE+cL2N9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks