General

  • Target

    07d3be8c4df887e034194eb0b16c963e_JaffaCakes118

  • Size

    90KB

  • Sample

    240429-q98j5acc46

  • MD5

    07d3be8c4df887e034194eb0b16c963e

  • SHA1

    73aabccc3811c97c64505a3ad45377e0e8a99965

  • SHA256

    aa9766333f3c909aef146b12b0b2302f9c898ef949f4e731cb21eb236d6a3793

  • SHA512

    009fb5fb473679f7f486e7dd65b6a4b717f3166d2979fe74b469a9e41b9415c605fb93addc4ddcc95ea3d8ed33fa386ad00b8746bb5e291fc8e77cc3450c2d14

  • SSDEEP

    1536:tptJlmrJpmxlRw99NBf+aHE+y134L/Ojsn/orH/Dz:zte2dw99fzy1IL/csQrH/

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://lunamarialovelife.com/BGbuRaCy

exe.dropper

http://scotthagar.com/wQf4xNY

exe.dropper

http://vjencanjazagreb.hr/GsRrp

exe.dropper

http://challengerballtournament.com/tZH0dI

exe.dropper

http://xn--12cbq4codld5bxbqy5hych1ap4b0a4mugg.tk/jEKcM

Targets

    • Target

      07d3be8c4df887e034194eb0b16c963e_JaffaCakes118

    • Size

      90KB

    • MD5

      07d3be8c4df887e034194eb0b16c963e

    • SHA1

      73aabccc3811c97c64505a3ad45377e0e8a99965

    • SHA256

      aa9766333f3c909aef146b12b0b2302f9c898ef949f4e731cb21eb236d6a3793

    • SHA512

      009fb5fb473679f7f486e7dd65b6a4b717f3166d2979fe74b469a9e41b9415c605fb93addc4ddcc95ea3d8ed33fa386ad00b8746bb5e291fc8e77cc3450c2d14

    • SSDEEP

      1536:tptJlmrJpmxlRw99NBf+aHE+y134L/Ojsn/orH/Dz:zte2dw99fzy1IL/csQrH/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks