General

  • Target

    de65e9220113457510a1160dc80c17fa_JaffaCakes118

  • Size

    36KB

  • Sample

    241210-y4xvfaxldw

  • MD5

    de65e9220113457510a1160dc80c17fa

  • SHA1

    bc4a366875e108d4108b657b1b183caa4119ecf4

  • SHA256

    40cb457d0a503560058b9d85bd5b64fd7008c663189436033fdcd7579186a93e

  • SHA512

    fb9ad66fb229db1af6dd7b2a5e33ba2232897cb42f1fc725820ff5cbd755517aa5de05ecab8a0a6b0de5e1740d1a1205d60fd0b865455179663c0525dd64a4e4

  • SSDEEP

    768:EPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJFgK4xIHOXI6FUxqQ:gok3hbdlylKsgqopeJBWhZFGkE+cL2N2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://markens.online/wp-data.php

xlm40.dropper

https://statedauto.com/wp-data.php

Targets

    • Target

      de65e9220113457510a1160dc80c17fa_JaffaCakes118

    • Size

      36KB

    • MD5

      de65e9220113457510a1160dc80c17fa

    • SHA1

      bc4a366875e108d4108b657b1b183caa4119ecf4

    • SHA256

      40cb457d0a503560058b9d85bd5b64fd7008c663189436033fdcd7579186a93e

    • SHA512

      fb9ad66fb229db1af6dd7b2a5e33ba2232897cb42f1fc725820ff5cbd755517aa5de05ecab8a0a6b0de5e1740d1a1205d60fd0b865455179663c0525dd64a4e4

    • SSDEEP

      768:EPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJFgK4xIHOXI6FUxqQ:gok3hbdlylKsgqopeJBWhZFGkE+cL2N2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks