General

  • Target

    23e51fa32cd82c6c4b38e6c4b69719fb_JaffaCakes118

  • Size

    217KB

  • Sample

    240508-jq3q7sac4y

  • MD5

    23e51fa32cd82c6c4b38e6c4b69719fb

  • SHA1

    a4e50bf4379260c9a51d264b9ade01ec551e3847

  • SHA256

    f70cbc150d38fcc49d90a937173b8163acb965d5a694bf339847c156491c8d3e

  • SHA512

    78152a2dcbe015608987cb570c26beb8168025866b28158544427f30236a9dd50a536c01bb82a9fb02545ad1ede19aa5c56a2e8d8debf120a6500dbf1d7c7cbb

  • SSDEEP

    3072:vYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////R:x0uXnWFchmmcI/o1//+pgw39

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://somosdrucken.com/upload/GGQL96W/

exe.dropper

http://www.vedigitize.com/wp-includes/l9K6YJ/

exe.dropper

http://www.sosyalben.org/hpKTnb/

exe.dropper

http://www.sutomoresmestaj.net/menu/E/

exe.dropper

http://www.traveltoharamain.com/cgi-bin/b/

exe.dropper

http://www.thinkdesign4u.com/css/Rtc1/

exe.dropper

https://www.mwk-bionik.de/fileadmin/vOJ/

Targets

    • Target

      23e51fa32cd82c6c4b38e6c4b69719fb_JaffaCakes118

    • Size

      217KB

    • MD5

      23e51fa32cd82c6c4b38e6c4b69719fb

    • SHA1

      a4e50bf4379260c9a51d264b9ade01ec551e3847

    • SHA256

      f70cbc150d38fcc49d90a937173b8163acb965d5a694bf339847c156491c8d3e

    • SHA512

      78152a2dcbe015608987cb570c26beb8168025866b28158544427f30236a9dd50a536c01bb82a9fb02545ad1ede19aa5c56a2e8d8debf120a6500dbf1d7c7cbb

    • SSDEEP

      3072:vYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////R:x0uXnWFchmmcI/o1//+pgw39

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks