General

  • Target

    08b51aa4b15ad4b28b70931db3a86444_JaffaCakes118

  • Size

    198KB

  • Sample

    240430-bsb29sgf61

  • MD5

    08b51aa4b15ad4b28b70931db3a86444

  • SHA1

    7d00f17229eb5e8e5efb29ba0c7be8eaad557ef7

  • SHA256

    4f21e25c362b1dc72f9dd3b2b0910516918a46a4016a631a2ee276493d7d160d

  • SHA512

    5c7d90587afe7204fbad31d5234eb88e6da42d3c8ee35651afd4a72904adab8491460a35141d1e1704b96ce28a4e792d1a0b127319df7b57cc69af50a499f882

  • SSDEEP

    1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj18:xrfrzOH98ipgVEDvxBYre

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://houtai.xiaopbk.com/install/t0H/

exe.dropper

https://gudangalami.com/ivo6rp/UaBj2/

exe.dropper

https://webhostingsrilanka.info/pkrgs/ODn/

exe.dropper

http://luzzeri.com/wp-includes/T1mrkC/

exe.dropper

http://mobithem.com/blogs/Z3/

exe.dropper

http://planosdesaudesemcarencia.com/erros/E8iv/

exe.dropper

http://lookuppopup.co.uk/content/uploads/XNEm9/

Targets

    • Target

      08b51aa4b15ad4b28b70931db3a86444_JaffaCakes118

    • Size

      198KB

    • MD5

      08b51aa4b15ad4b28b70931db3a86444

    • SHA1

      7d00f17229eb5e8e5efb29ba0c7be8eaad557ef7

    • SHA256

      4f21e25c362b1dc72f9dd3b2b0910516918a46a4016a631a2ee276493d7d160d

    • SHA512

      5c7d90587afe7204fbad31d5234eb88e6da42d3c8ee35651afd4a72904adab8491460a35141d1e1704b96ce28a4e792d1a0b127319df7b57cc69af50a499f882

    • SSDEEP

      1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj18:xrfrzOH98ipgVEDvxBYre

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks