General

  • Target

    65b433392c856bcf8457f4f25a3c9228_JaffaCakes118

  • Size

    36KB

  • Sample

    240723-cdrd3s1gqp

  • MD5

    65b433392c856bcf8457f4f25a3c9228

  • SHA1

    94941ac6d7d0dda8404d2f2c44e2e99269cfb1c1

  • SHA256

    9084aca9c6c96722be49e439d8082661714c9ab504304bdfe5d8096ce9e3eb6c

  • SHA512

    5885fcc6b71fd10028aa90307375389226ea9b69c98f5d42524ddf0a2138bf536fa4d8525f61843d7c21843a9d81f75aa35a6c98ce5ca4ed3d78a78938589517

  • SSDEEP

    768:JPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJI/RS1a8khCsgzTSpwq1:Bok3hbdlylKsgqopeJBWhZFGkE+cL2NJ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://syracuse.best/wp-data.php

xlm40.dropper

https://skill.fashion/wp-data.php

Targets

    • Target

      65b433392c856bcf8457f4f25a3c9228_JaffaCakes118

    • Size

      36KB

    • MD5

      65b433392c856bcf8457f4f25a3c9228

    • SHA1

      94941ac6d7d0dda8404d2f2c44e2e99269cfb1c1

    • SHA256

      9084aca9c6c96722be49e439d8082661714c9ab504304bdfe5d8096ce9e3eb6c

    • SHA512

      5885fcc6b71fd10028aa90307375389226ea9b69c98f5d42524ddf0a2138bf536fa4d8525f61843d7c21843a9d81f75aa35a6c98ce5ca4ed3d78a78938589517

    • SSDEEP

      768:JPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJI/RS1a8khCsgzTSpwq1:Bok3hbdlylKsgqopeJBWhZFGkE+cL2NJ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks