General

  • Target

    1f4381ea9b273ee987253961856eb0dc_JaffaCakes118

  • Size

    241KB

  • Sample

    240507-dr43rsff5x

  • MD5

    1f4381ea9b273ee987253961856eb0dc

  • SHA1

    050eb90abdf186d90bdf29fcf318a404c1c3f3af

  • SHA256

    0db3fa18225f3b0e4a30a5303b50f5fd89440d33f726f2b2456ed4ec2b29efb6

  • SHA512

    0580741f7c58cad95be11e6cde61e7ff8514df6a4db4c1468eebfcee761fd968d0c29f0a1f615f5e561c25d7fd436a8db5d65252f5ce54df5ebfedd87b95ae3c

  • SSDEEP

    3072:wYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////r:40uXnWFchmmcI/o1/XOflT

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.ksgresearch.org/LLC/z9B/

exe.dropper

http://www.mitrausahacontrucion.com/multifunctional-section/X2v4XN/

exe.dropper

http://daprofesional.com/data4/rsdbA1h/

exe.dropper

http://degisimkalip.com.tr/wp-admin/ZML/

exe.dropper

http://da-industrial.com/js/6GGA48AK/

exe.dropper

http://cse-engineer.com/cgi-bin/BOiL/

exe.dropper

http://casabeethovenlb.com/classes/7SUlG/

Targets

    • Target

      1f4381ea9b273ee987253961856eb0dc_JaffaCakes118

    • Size

      241KB

    • MD5

      1f4381ea9b273ee987253961856eb0dc

    • SHA1

      050eb90abdf186d90bdf29fcf318a404c1c3f3af

    • SHA256

      0db3fa18225f3b0e4a30a5303b50f5fd89440d33f726f2b2456ed4ec2b29efb6

    • SHA512

      0580741f7c58cad95be11e6cde61e7ff8514df6a4db4c1468eebfcee761fd968d0c29f0a1f615f5e561c25d7fd436a8db5d65252f5ce54df5ebfedd87b95ae3c

    • SSDEEP

      3072:wYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////r:40uXnWFchmmcI/o1/XOflT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks