General

  • Target

    0227c55f9f24f35967c1058f51d3fe89_JaffaCakes118

  • Size

    118KB

  • Sample

    240427-cdltlahf4v

  • MD5

    0227c55f9f24f35967c1058f51d3fe89

  • SHA1

    7608a0100fa013516e16c75fe9d9e9d18781cb43

  • SHA256

    c0df3edf60c6b97a3f53c12c0d9f5febab7ec5463fce35ed06205d69aa5bdea3

  • SHA512

    99ea83757643394a58815fdcdae9d548330a551507107907985a2907811d74f9af6940c49cf739e36fce4ebcfaded8f546cc0915618840dd3be55d0feb4ee790

  • SSDEEP

    1536:MAHzBgrgPEdgSxga93I+agDRUYIspaSbTV8j3KIhduO9/e7P+:NgrgPEdRxgG3LRU7eLXV8jamuOtf

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://itsonmymind.com/2yHTG/

exe.dropper

http://rostudios.ca/kLOAkR0/

exe.dropper

http://billeter.net/UOFpF/

exe.dropper

http://eurebia.net/nSzrmLC/

Targets

    • Target

      0227c55f9f24f35967c1058f51d3fe89_JaffaCakes118

    • Size

      118KB

    • MD5

      0227c55f9f24f35967c1058f51d3fe89

    • SHA1

      7608a0100fa013516e16c75fe9d9e9d18781cb43

    • SHA256

      c0df3edf60c6b97a3f53c12c0d9f5febab7ec5463fce35ed06205d69aa5bdea3

    • SHA512

      99ea83757643394a58815fdcdae9d548330a551507107907985a2907811d74f9af6940c49cf739e36fce4ebcfaded8f546cc0915618840dd3be55d0feb4ee790

    • SSDEEP

      1536:MAHzBgrgPEdgSxga93I+agDRUYIspaSbTV8j3KIhduO9/e7P+:NgrgPEdRxgG3LRU7eLXV8jamuOtf

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks