General

  • Target

    145c28eaeac325e845b66a82c2220f2d_JaffaCakes118

  • Size

    292KB

  • Sample

    240504-y9x3dsad7t

  • MD5

    145c28eaeac325e845b66a82c2220f2d

  • SHA1

    dbe78d912a79433d5cc619fce31c14b4f014667e

  • SHA256

    9e5504ef68a5d98d68ad98f656bebe7eb115aa04b36a73207a8a3ba9cb44514c

  • SHA512

    f878b9e615e26f9ce94814f8e2cf41a29024b020a19c542f6575223c4a02dcdb0383e0e52b03284a45d64894b885bc65b20cd0b269ef873e17082d414ab6e18e

  • SSDEEP

    6144:1l20PikYuZ1XU1xD1Xm+BUY+VllauD/qw+uc+y/dK1S4BspWQF3bKsP:1l16u78hXm+BUY8lPDHcl3Ks

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.aveya.in/wp-content/closing/Invoice.exe

Targets

    • Target

      145c28eaeac325e845b66a82c2220f2d_JaffaCakes118

    • Size

      292KB

    • MD5

      145c28eaeac325e845b66a82c2220f2d

    • SHA1

      dbe78d912a79433d5cc619fce31c14b4f014667e

    • SHA256

      9e5504ef68a5d98d68ad98f656bebe7eb115aa04b36a73207a8a3ba9cb44514c

    • SHA512

      f878b9e615e26f9ce94814f8e2cf41a29024b020a19c542f6575223c4a02dcdb0383e0e52b03284a45d64894b885bc65b20cd0b269ef873e17082d414ab6e18e

    • SSDEEP

      6144:1l20PikYuZ1XU1xD1Xm+BUY+VllauD/qw+uc+y/dK1S4BspWQF3bKsP:1l16u78hXm+BUY8lPDHcl3Ks

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks