General

  • Target

    01d80d1419728cf60325a8a70c288cf9_JaffaCakes118

  • Size

    187KB

  • Sample

    240426-2syt5sef2t

  • MD5

    01d80d1419728cf60325a8a70c288cf9

  • SHA1

    33ab93a745cf32fcbb52ba32b5463ae10f2ad9e7

  • SHA256

    d30169f108ec72fbaf16bb8726e798602988e1c42a7b3020b0ef0ad0572f9625

  • SHA512

    81f30243cc224dd75e10bd985d2ddea65d0150758279c804afa6a73d3c5ad0d973928ba61995667149632b6742b023f39c48185a525e5486a1a0605d04f76d32

  • SSDEEP

    1536:RGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilATmd8YkYeT/EA8sap8cjufajnj:vrfrzOH98ipgsh5MYD

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://dtyl.shop/wp-content/W68Nx/

exe.dropper

https://star-speed.vip/wp-admin/U2jRIg/

exe.dropper

https://cshub123.cn/wp-admin/Gajs/

exe.dropper

https://viettellogistics.com.vn/wp-content/oS4/

exe.dropper

http://cococat.se/wp-admin/2Oaf/

exe.dropper

http://andresirjan.ir/wp-admin/JSH/

exe.dropper

https://sptrade.com.br/wp-includes/iFZOvL/

Targets

    • Target

      01d80d1419728cf60325a8a70c288cf9_JaffaCakes118

    • Size

      187KB

    • MD5

      01d80d1419728cf60325a8a70c288cf9

    • SHA1

      33ab93a745cf32fcbb52ba32b5463ae10f2ad9e7

    • SHA256

      d30169f108ec72fbaf16bb8726e798602988e1c42a7b3020b0ef0ad0572f9625

    • SHA512

      81f30243cc224dd75e10bd985d2ddea65d0150758279c804afa6a73d3c5ad0d973928ba61995667149632b6742b023f39c48185a525e5486a1a0605d04f76d32

    • SSDEEP

      1536:RGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilATmd8YkYeT/EA8sap8cjufajnj:vrfrzOH98ipgsh5MYD

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks