General

  • Target

    20eef6233aaa7324d02e915505c5b79f_JaffaCakes118

  • Size

    99KB

  • Sample

    240507-st7n1ach6x

  • MD5

    20eef6233aaa7324d02e915505c5b79f

  • SHA1

    787fec8172052195aeadd274bc799977a593fae9

  • SHA256

    f5a2d9c77768742b062bb6cd25fe72df71a867ea986d0a129435741699a6127c

  • SHA512

    7f82ab351f0850355e8abf697cc67253edb2507e8a8ce080f2c6c25c9b2116533ce3f2a8f698f41294a86d7b4aa8b3ba546916e520d364297b93da6db28c88d4

  • SSDEEP

    1536:CEyaGDJEdgwzmSdj6IN+agz8PkhFnqbc9XH99GjTirBTN:5yZDJEdjmpT8MhFnL9Xd9sTsh

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://FlorissantFire.com/aspnet_client/FY0RNye/

exe.dropper

http://imgfxdesign.com/oy4rGPw/

exe.dropper

http://healthyrevelations.com/Ls8c/

exe.dropper

http://bakino.com/MUPtr/

Targets

    • Target

      20eef6233aaa7324d02e915505c5b79f_JaffaCakes118

    • Size

      99KB

    • MD5

      20eef6233aaa7324d02e915505c5b79f

    • SHA1

      787fec8172052195aeadd274bc799977a593fae9

    • SHA256

      f5a2d9c77768742b062bb6cd25fe72df71a867ea986d0a129435741699a6127c

    • SHA512

      7f82ab351f0850355e8abf697cc67253edb2507e8a8ce080f2c6c25c9b2116533ce3f2a8f698f41294a86d7b4aa8b3ba546916e520d364297b93da6db28c88d4

    • SSDEEP

      1536:CEyaGDJEdgwzmSdj6IN+agz8PkhFnqbc9XH99GjTirBTN:5yZDJEdjmpT8MhFnL9Xd9sTsh

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks