General

  • Target

    1880d13fa02bef8f17371845e0fe89cc_JaffaCakes118

  • Size

    93KB

  • Sample

    240505-t5hppafa2y

  • MD5

    1880d13fa02bef8f17371845e0fe89cc

  • SHA1

    5804bbdae06f7bd57f6711c5ab3adf124fac62af

  • SHA256

    be849032d67a24eda952c62593d2c6d991500c0a8e628fd189fa9ca51a221cdb

  • SHA512

    599ede07c5c416d7b4d285aa5ee30356d4fbd88411a7d39354413d5cfd3bebc4c798c786cf6dceab7a27cef1824809c78a54882e9d5d3a03cf0bf6892f207cea

  • SSDEEP

    1536:focn1kp59gxBK85fBlHF5qFycNGrFMMzV/+a9:A41k/W483lWycNGzV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.serefozata.com/axf

exe.dropper

http://www.livingbranchanimalsciences.com/zVMQFL

exe.dropper

http://www.donghodaian.com/jiPViP

exe.dropper

http://sprayzee.com/iiWYe6z

exe.dropper

http://yasarkemalplatformu.org/s

Targets

    • Target

      1880d13fa02bef8f17371845e0fe89cc_JaffaCakes118

    • Size

      93KB

    • MD5

      1880d13fa02bef8f17371845e0fe89cc

    • SHA1

      5804bbdae06f7bd57f6711c5ab3adf124fac62af

    • SHA256

      be849032d67a24eda952c62593d2c6d991500c0a8e628fd189fa9ca51a221cdb

    • SHA512

      599ede07c5c416d7b4d285aa5ee30356d4fbd88411a7d39354413d5cfd3bebc4c798c786cf6dceab7a27cef1824809c78a54882e9d5d3a03cf0bf6892f207cea

    • SSDEEP

      1536:focn1kp59gxBK85fBlHF5qFycNGrFMMzV/+a9:A41k/W483lWycNGzV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks