General

  • Target

    010cee2e1eb93558299df3f8a635c9d0_JaffaCakes118

  • Size

    199KB

  • Sample

    240426-slkjhafa8z

  • MD5

    010cee2e1eb93558299df3f8a635c9d0

  • SHA1

    eaab76bdce6ce4c6c9b57fbb7057ffc34d89c7d8

  • SHA256

    a28a23ca128d4219c14856421649e8be9836b60650040fba71022341d239b6fa

  • SHA512

    8b2c69e25364470c5fbee073338848ddedb943e8da9edfb496d6672a11fa652cfd280e5e98c476fd0e40b5c668dad10bcb56f7ff1770c81cc4cb91dd486c310c

  • SSDEEP

    1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj1/:xrfrzOH98ipgcEDvxBY36

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://houtai.xiaopbk.com/install/t0H/

exe.dropper

https://gudangalami.com/ivo6rp/UaBj2/

exe.dropper

https://webhostingsrilanka.info/pkrgs/ODn/

exe.dropper

http://luzzeri.com/wp-includes/T1mrkC/

exe.dropper

http://mobithem.com/blogs/Z3/

exe.dropper

http://planosdesaudesemcarencia.com/erros/E8iv/

exe.dropper

http://lookuppopup.co.uk/content/uploads/XNEm9/

Targets

    • Target

      010cee2e1eb93558299df3f8a635c9d0_JaffaCakes118

    • Size

      199KB

    • MD5

      010cee2e1eb93558299df3f8a635c9d0

    • SHA1

      eaab76bdce6ce4c6c9b57fbb7057ffc34d89c7d8

    • SHA256

      a28a23ca128d4219c14856421649e8be9836b60650040fba71022341d239b6fa

    • SHA512

      8b2c69e25364470c5fbee073338848ddedb943e8da9edfb496d6672a11fa652cfd280e5e98c476fd0e40b5c668dad10bcb56f7ff1770c81cc4cb91dd486c310c

    • SSDEEP

      1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj1/:xrfrzOH98ipgcEDvxBY36

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks