General

  • Target

    6951bde97aed01abfdb2e2fe64253efe_JaffaCakes118

  • Size

    228KB

  • Sample

    240523-b2z6fshb66

  • MD5

    6951bde97aed01abfdb2e2fe64253efe

  • SHA1

    4c7fa685fc7dc45c24166f994933276795f51688

  • SHA256

    8d51849a6ccb4e9f729e2d7e58ac2c684dddd73fd7364c7fb9e6ba53b617e02e

  • SHA512

    97950e503facf8b8d4811c68f5ba659fae1dedf727216059921efac07ce206c27351646cba5e47d0586ef21f8d5b017a1323879df419854d6efd072b51c65775

  • SSDEEP

    6144:lk3hOdsylKlgxopeiBNhZF+E+W2kdA5QXVjGbMJfYX7n4mGKPe0FbrkxPjS5Uhm:/oj1MTZFbrGS5Uhm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://jumper.rocks/wp-index.php

xlm40.dropper

https://jumper.yoga/wp-index.php

Targets

    • Target

      6951bde97aed01abfdb2e2fe64253efe_JaffaCakes118

    • Size

      228KB

    • MD5

      6951bde97aed01abfdb2e2fe64253efe

    • SHA1

      4c7fa685fc7dc45c24166f994933276795f51688

    • SHA256

      8d51849a6ccb4e9f729e2d7e58ac2c684dddd73fd7364c7fb9e6ba53b617e02e

    • SHA512

      97950e503facf8b8d4811c68f5ba659fae1dedf727216059921efac07ce206c27351646cba5e47d0586ef21f8d5b017a1323879df419854d6efd072b51c65775

    • SSDEEP

      6144:lk3hOdsylKlgxopeiBNhZF+E+W2kdA5QXVjGbMJfYX7n4mGKPe0FbrkxPjS5Uhm:/oj1MTZFbrGS5Uhm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks