General

  • Target

    0c9bf188df6018db8daecd7d6f8e73a0_JaffaCakes118

  • Size

    197KB

  • Sample

    240501-xrx41agc73

  • MD5

    0c9bf188df6018db8daecd7d6f8e73a0

  • SHA1

    eae18ce7a7eb286e960f4b6fbcd014780cb06c74

  • SHA256

    f43e11eca26da901a30dda136c7039b3abe7895ad174067ebd0a0639c7c750a5

  • SHA512

    c9eb4e84ddccff8bc88125294d961c5bdf2a9a99ed24448176c0d5c5cdcb81e29eaf21e909006ea3bcf68f5c413dabd6ecf0ad451d975d1f873c72c1b6ba6bba

  • SSDEEP

    3072:z12y/Gdy3ktGDWLS0HZWD5w8K7Nk9LD7IBUVhXiEt0g0jndK:z12k4ftGiL3HJk9LD7bVhXV0fjnc

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://maelkajangcanopy.com/wp-admin/JBiRPnVvr/

exe.dropper

https://stylewebcruze.online/images/WLReuvW/

exe.dropper

https://stperformance.co.uk/wp-admin/toubufsC/

exe.dropper

http://jandmadventuring.servermaintain.com/wp-content/uploads/cjy4-j423i30-616378266/

exe.dropper

https://www.liuxuebook.com/wp-content/BEtxnxQWn/

Targets

    • Target

      0c9bf188df6018db8daecd7d6f8e73a0_JaffaCakes118

    • Size

      197KB

    • MD5

      0c9bf188df6018db8daecd7d6f8e73a0

    • SHA1

      eae18ce7a7eb286e960f4b6fbcd014780cb06c74

    • SHA256

      f43e11eca26da901a30dda136c7039b3abe7895ad174067ebd0a0639c7c750a5

    • SHA512

      c9eb4e84ddccff8bc88125294d961c5bdf2a9a99ed24448176c0d5c5cdcb81e29eaf21e909006ea3bcf68f5c413dabd6ecf0ad451d975d1f873c72c1b6ba6bba

    • SSDEEP

      3072:z12y/Gdy3ktGDWLS0HZWD5w8K7Nk9LD7IBUVhXiEt0g0jndK:z12k4ftGiL3HJk9LD7bVhXV0fjnc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks