General

  • Target

    27f9257e764a26b68592de0db8d0aa93_JaffaCakes118

  • Size

    178KB

  • Sample

    240509-dhk9aseh5t

  • MD5

    27f9257e764a26b68592de0db8d0aa93

  • SHA1

    a86e59440c9652678b762fd6944cf93c55d96a0e

  • SHA256

    94035005c1b01a7ee5cdc000f6cc2128dd739606543d29bf12949670c34ad78c

  • SHA512

    c7e9c2cb12bdb1ac33bd4fc736b79c38902c191e405e18c9fa896e4b2e9c73ffb0a810e238a279197937b990d734cc183d7a3d31719c728f885154d1b2ec89bd

  • SSDEEP

    1536:d2B72BYrdi1Ir77zOH98Wj2gpngd+a9NqPWjD2kKjHDYs+sbM+Sy1n4:WrfrzOH98ipgFi2SHDYsDM+Sy1n4

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://msmartyford.com/assets/BIO/

exe.dropper

http://jiafunongye.com/application/zh3/

exe.dropper

http://calledtochange.org/CalledtoChange/Uh/

exe.dropper

https://janataralo.com/public_html/k/

exe.dropper

https://www.breedenandsilver.com/wp-content/j/

exe.dropper

http://valleymedicalandsurgicalclinic.com/ujftb/p/

exe.dropper

https://cimsjr.com/hospital/x2f/

Targets

    • Target

      27f9257e764a26b68592de0db8d0aa93_JaffaCakes118

    • Size

      178KB

    • MD5

      27f9257e764a26b68592de0db8d0aa93

    • SHA1

      a86e59440c9652678b762fd6944cf93c55d96a0e

    • SHA256

      94035005c1b01a7ee5cdc000f6cc2128dd739606543d29bf12949670c34ad78c

    • SHA512

      c7e9c2cb12bdb1ac33bd4fc736b79c38902c191e405e18c9fa896e4b2e9c73ffb0a810e238a279197937b990d734cc183d7a3d31719c728f885154d1b2ec89bd

    • SSDEEP

      1536:d2B72BYrdi1Ir77zOH98Wj2gpngd+a9NqPWjD2kKjHDYs+sbM+Sy1n4:WrfrzOH98ipgFi2SHDYsDM+Sy1n4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks