General

  • Target

    1771e443533954e1f4219536ecab0b05_JaffaCakes118

  • Size

    221KB

  • Sample

    240505-ng1byage3s

  • MD5

    1771e443533954e1f4219536ecab0b05

  • SHA1

    cf37bdbfb387aab0b2f2f59e57e08f2636774351

  • SHA256

    f764c5a489ae94b2a089f5333c8911cc6f4584805203a09110346af8f427a5cc

  • SHA512

    fba85676ab6436843e91c2be099f8e634d0e6f11852d3aa408208b8aaeebfaf34cfd33e613e76186e21a030756729464a8b9d6be467a8469d1c5af097b0a9b7c

  • SSDEEP

    3072:b4tcTvjvTY140818tIP4ovpjSGju9jDW1M+7op32:EtcnvE140o8tIP4apUjDjm+2

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hottco.com/stats/erd/

exe.dropper

http://dutarini.com/cgi-bin/6/

exe.dropper

https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/

exe.dropper

http://pastaciyiz.biz/wp-includes/fvx/

exe.dropper

https://dogaltrm.com/components/r6h/

exe.dropper

https://dortislem.net/administrator/c/

exe.dropper

https://onyourleftracing.com/cgi-bin/QcC/

Targets

    • Target

      1771e443533954e1f4219536ecab0b05_JaffaCakes118

    • Size

      221KB

    • MD5

      1771e443533954e1f4219536ecab0b05

    • SHA1

      cf37bdbfb387aab0b2f2f59e57e08f2636774351

    • SHA256

      f764c5a489ae94b2a089f5333c8911cc6f4584805203a09110346af8f427a5cc

    • SHA512

      fba85676ab6436843e91c2be099f8e634d0e6f11852d3aa408208b8aaeebfaf34cfd33e613e76186e21a030756729464a8b9d6be467a8469d1c5af097b0a9b7c

    • SSDEEP

      3072:b4tcTvjvTY140818tIP4ovpjSGju9jDW1M+7op32:EtcnvE140o8tIP4apUjDjm+2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks