General

  • Target

    200f08297cc9faefc5ea695ba65e90a9_JaffaCakes118

  • Size

    89KB

  • Sample

    240507-kktrsagh2z

  • MD5

    200f08297cc9faefc5ea695ba65e90a9

  • SHA1

    f971df29a33cdbdf65cb776bc947e1f28f6d6e5e

  • SHA256

    c555b4b4df8721a2d969f375d8f5fa7deba2f76dc03f32de4c5b1a8515efb02b

  • SHA512

    aca15b6f4d4a4fdf564e9457867241e5af3cb9656e148cbf2f4f1eaf7cc516f4bed6f0badfbf53651cf8c05ecdb098f200a6b3ab29a048a51c2c9890b8c47a6f

  • SSDEEP

    1536:lptJlmrJpmxlRw99NBD/t+alqtmmFZ/tiwp613rvDaHwwle:bte2dw99fD/LqtmQVp6laT

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://miafashionropadeportiva.com/y

exe.dropper

http://terabuild.sevencolours.eu/4bc2kL

exe.dropper

http://oztax-homepage.tonishdev.com/Lg4

exe.dropper

http://vioprotection.com.co/u

exe.dropper

http://test.helos.no/6GZ24w1

Targets

    • Target

      200f08297cc9faefc5ea695ba65e90a9_JaffaCakes118

    • Size

      89KB

    • MD5

      200f08297cc9faefc5ea695ba65e90a9

    • SHA1

      f971df29a33cdbdf65cb776bc947e1f28f6d6e5e

    • SHA256

      c555b4b4df8721a2d969f375d8f5fa7deba2f76dc03f32de4c5b1a8515efb02b

    • SHA512

      aca15b6f4d4a4fdf564e9457867241e5af3cb9656e148cbf2f4f1eaf7cc516f4bed6f0badfbf53651cf8c05ecdb098f200a6b3ab29a048a51c2c9890b8c47a6f

    • SSDEEP

      1536:lptJlmrJpmxlRw99NBD/t+alqtmmFZ/tiwp613rvDaHwwle:bte2dw99fD/LqtmQVp6laT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks