General

  • Target

    1f9af5ac17faa0795c0d99ad4701ee1f_JaffaCakes118

  • Size

    220KB

  • Sample

    240507-f78f8sbc9s

  • MD5

    1f9af5ac17faa0795c0d99ad4701ee1f

  • SHA1

    925cd86fa4f2ce453aa08acd116c54c0f783bf99

  • SHA256

    46d0d258bb70a036118ec6789d17461792de8dcf52f1ddc84770a9be3627fece

  • SHA512

    d310cd1d41fc87dfa3c00d0a10de09297666ddf8ef8db29a5a70227db0d09c16397701f28b176e54c8b8feae16aca65c4b20b90d2c4098f83a182ffee168b91a

  • SSDEEP

    3072:b4tcTvjvTY140818tIP4ovpzSGju9jDW1M+7gp3y:EtcnvE140o8tIP4apEjDjm2y

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hottco.com/stats/erd/

exe.dropper

http://dutarini.com/cgi-bin/6/

exe.dropper

https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/

exe.dropper

http://pastaciyiz.biz/wp-includes/fvx/

exe.dropper

https://dogaltrm.com/components/r6h/

exe.dropper

https://dortislem.net/administrator/c/

exe.dropper

https://onyourleftracing.com/cgi-bin/QcC/

Targets

    • Target

      1f9af5ac17faa0795c0d99ad4701ee1f_JaffaCakes118

    • Size

      220KB

    • MD5

      1f9af5ac17faa0795c0d99ad4701ee1f

    • SHA1

      925cd86fa4f2ce453aa08acd116c54c0f783bf99

    • SHA256

      46d0d258bb70a036118ec6789d17461792de8dcf52f1ddc84770a9be3627fece

    • SHA512

      d310cd1d41fc87dfa3c00d0a10de09297666ddf8ef8db29a5a70227db0d09c16397701f28b176e54c8b8feae16aca65c4b20b90d2c4098f83a182ffee168b91a

    • SSDEEP

      3072:b4tcTvjvTY140818tIP4ovpzSGju9jDW1M+7gp3y:EtcnvE140o8tIP4apEjDjm2y

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks