General

  • Target

    031be6a39da92ccedefc3ef3e5cc12aa_JaffaCakes118

  • Size

    157KB

  • Sample

    240427-m6m78shb75

  • MD5

    031be6a39da92ccedefc3ef3e5cc12aa

  • SHA1

    1eed6a05b977b6b13a8df2cafed8f1cdf7d53088

  • SHA256

    5d4bee6f5bb0d02b980f21c2ae731bd12d5de2e2810058e6098fc888a7cc6f7b

  • SHA512

    99439b0d0054948cd9038fce94d30eaa0da0f6a37a46b6106e7323fc256cd6f133ebeee717062148519df2b5b90611a29fcc45017c7b403b723e21cd372e00bc

  • SSDEEP

    1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a9BlJizP:1rfrzOH98ipgnYzP

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://case.gonukkad.com/sys-cache/CjT/

exe.dropper

https://starrcoin.net/wp-admin/YT/

exe.dropper

http://modelaw.devkind.com.au/wp-admin/cvDRmGK/

exe.dropper

http://dprkp.palembang.go.id/sys-cache/7Y4aHw/

exe.dropper

http://completeguideblogging.com/euiot/PAuJG/

exe.dropper

http://qutiche.cn/wp-admin/Q/

exe.dropper

https://shiva-engineering.com/1cj/tKemHV7/

Targets

    • Target

      031be6a39da92ccedefc3ef3e5cc12aa_JaffaCakes118

    • Size

      157KB

    • MD5

      031be6a39da92ccedefc3ef3e5cc12aa

    • SHA1

      1eed6a05b977b6b13a8df2cafed8f1cdf7d53088

    • SHA256

      5d4bee6f5bb0d02b980f21c2ae731bd12d5de2e2810058e6098fc888a7cc6f7b

    • SHA512

      99439b0d0054948cd9038fce94d30eaa0da0f6a37a46b6106e7323fc256cd6f133ebeee717062148519df2b5b90611a29fcc45017c7b403b723e21cd372e00bc

    • SSDEEP

      1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a9BlJizP:1rfrzOH98ipgnYzP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks