General

  • Target

    269d71d42cd2e684c548cb4c67eafdee_JaffaCakes118

  • Size

    208KB

  • Sample

    240508-zcm2laec31

  • MD5

    269d71d42cd2e684c548cb4c67eafdee

  • SHA1

    152f977042bf6f637484af13dac93503ab2b87c0

  • SHA256

    8c74fec049097ab0d1ed276e534d2221a34700bf3cb05513a883456c62dfc0ee

  • SHA512

    af0792fd93b78d7145f84a84d88db73baa2c216fde8747ed76059a2c51b03c6ead8b3860e3c46766478167c089d8c295ea0cd788a65f67dff004a3ef11db266f

  • SSDEEP

    3072:Fte2dw99fdaN7EqSC/ZG3Fo3I4IKqzNdJHn0Qexv0jdsja7OMCbsUSW:3Hdw7kN75B/CF/TzNdJHnYOjOa7iwU3

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://louisianaplating.com/18Ge0wDF

exe.dropper

http://stonehouse.me.uk/AlvUfSm

exe.dropper

http://peakperformance.fit/2TfHVaCdGP

exe.dropper

http://djsomali.com/z4x6QiEr

exe.dropper

http://maquettes.groupeseb.com/Lf01Lq4ZSS

Targets

    • Target

      269d71d42cd2e684c548cb4c67eafdee_JaffaCakes118

    • Size

      208KB

    • MD5

      269d71d42cd2e684c548cb4c67eafdee

    • SHA1

      152f977042bf6f637484af13dac93503ab2b87c0

    • SHA256

      8c74fec049097ab0d1ed276e534d2221a34700bf3cb05513a883456c62dfc0ee

    • SHA512

      af0792fd93b78d7145f84a84d88db73baa2c216fde8747ed76059a2c51b03c6ead8b3860e3c46766478167c089d8c295ea0cd788a65f67dff004a3ef11db266f

    • SSDEEP

      3072:Fte2dw99fdaN7EqSC/ZG3Fo3I4IKqzNdJHn0Qexv0jdsja7OMCbsUSW:3Hdw7kN75B/CF/TzNdJHnYOjOa7iwU3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks