General

  • Target

    fe3d5b6cc7bfce251e1a52ba2f00b0d7_JaffaCakes118

  • Size

    36KB

  • Sample

    240421-c5hagsgh52

  • MD5

    fe3d5b6cc7bfce251e1a52ba2f00b0d7

  • SHA1

    229067db495bd7eebae01abbe30a69f3b9feb942

  • SHA256

    26b306992af3b9a4ddb181512aa9e6714700b44fbd06a61c20f13a018aab61de

  • SHA512

    ad6706b04731198c96a3a3c0f7638c6fa5f27c62b41aa944aa91ca3c6d1b5d456d67fc86286ed003d85afad1166d14b7654367b9fc6c420d35a53d13fbda5943

  • SSDEEP

    768:9PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJBC7nghHevAEvxbPXN:1ok3hbdlylKsgqopeJBWhZFGkE+cL2N/

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://skill.fashion/wp-data.php

xlm40.dropper

https://syracuse.best/wp-data.php

Targets

    • Target

      fe3d5b6cc7bfce251e1a52ba2f00b0d7_JaffaCakes118

    • Size

      36KB

    • MD5

      fe3d5b6cc7bfce251e1a52ba2f00b0d7

    • SHA1

      229067db495bd7eebae01abbe30a69f3b9feb942

    • SHA256

      26b306992af3b9a4ddb181512aa9e6714700b44fbd06a61c20f13a018aab61de

    • SHA512

      ad6706b04731198c96a3a3c0f7638c6fa5f27c62b41aa944aa91ca3c6d1b5d456d67fc86286ed003d85afad1166d14b7654367b9fc6c420d35a53d13fbda5943

    • SSDEEP

      768:9PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJBC7nghHevAEvxbPXN:1ok3hbdlylKsgqopeJBWhZFGkE+cL2N/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks