General

  • Target

    0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118

  • Size

    65KB

  • Sample

    240428-bx2tgsde3t

  • MD5

    0413f92d3b2f6300a0ed5d6d362ef09c

  • SHA1

    e0ed8f26783e15a4fcc44b13997912295dc52bad

  • SHA256

    58c6de98959ad1e8fa0c907b8132e557f516944676936af659f6c80b1ac2804e

  • SHA512

    20ae21f5f8456c4cbb3a294f54aaf4c2ab7330a2d994f91eee7ac2f1a56b08697821af3158f3050d37878b166d8a9930ba12ccefb2f9339c87b921acef952388

  • SSDEEP

    768:cpJcaUitGAlmrJpmxlzC+w99NBz+1o80cZBv0fNNfw/i9m57MI2:cptJlmrJpmxlRw99NBz+a8vBi

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://abporter.org/zhniYMNIL

exe.dropper

http://bearinmindstrategies.com/of7Cpb8

exe.dropper

http://ondacapital.es/EwCyzzc

exe.dropper

http://landspa.ir/Nl9U64Eg0

exe.dropper

http://shoshana.ge/QwlUmzzVaF

Targets

    • Target

      0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118

    • Size

      65KB

    • MD5

      0413f92d3b2f6300a0ed5d6d362ef09c

    • SHA1

      e0ed8f26783e15a4fcc44b13997912295dc52bad

    • SHA256

      58c6de98959ad1e8fa0c907b8132e557f516944676936af659f6c80b1ac2804e

    • SHA512

      20ae21f5f8456c4cbb3a294f54aaf4c2ab7330a2d994f91eee7ac2f1a56b08697821af3158f3050d37878b166d8a9930ba12ccefb2f9339c87b921acef952388

    • SSDEEP

      768:cpJcaUitGAlmrJpmxlzC+w99NBz+1o80cZBv0fNNfw/i9m57MI2:cptJlmrJpmxlRw99NBz+a8vBi

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks