General

  • Target

    2049ca758fcda413346b7ce7fac3a09d_JaffaCakes118

  • Size

    80KB

  • Sample

    240507-l9gn7aed38

  • MD5

    2049ca758fcda413346b7ce7fac3a09d

  • SHA1

    6eddfb02a3f511943e5ac506bdb0144020fd93cc

  • SHA256

    abec5acf315037e25cfd87c8d0a2c381930258b22974c2aa3dfd365a90458ff3

  • SHA512

    534657ef05d404f65813587d1ee7aab32101396399d4f6fc5e02ac55d5652e59a367e3acee13b3acdc591ee4ab86ecc7d1a8e75986f776d67f6df1be838987d3

  • SSDEEP

    1536:SptJlmrJpmxlRw99NB6+a0HpTMUrCP+zN+Y:Ote2dw99fdIMN+

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://domestic21.com/HeVI4P

exe.dropper

http://laser-co2.com.pl/07G4T83

exe.dropper

http://kqs.me/1J6yWxp

exe.dropper

http://medion.ba/nzz2S

exe.dropper

http://xn--e1agmcgagdko5byd.xn--p1ai/gpTIKj

Targets

    • Target

      2049ca758fcda413346b7ce7fac3a09d_JaffaCakes118

    • Size

      80KB

    • MD5

      2049ca758fcda413346b7ce7fac3a09d

    • SHA1

      6eddfb02a3f511943e5ac506bdb0144020fd93cc

    • SHA256

      abec5acf315037e25cfd87c8d0a2c381930258b22974c2aa3dfd365a90458ff3

    • SHA512

      534657ef05d404f65813587d1ee7aab32101396399d4f6fc5e02ac55d5652e59a367e3acee13b3acdc591ee4ab86ecc7d1a8e75986f776d67f6df1be838987d3

    • SSDEEP

      1536:SptJlmrJpmxlRw99NB6+a0HpTMUrCP+zN+Y:Ote2dw99fdIMN+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks