General

  • Target

    28995c680fb5acc639d9c48751cc5ff7_JaffaCakes118

  • Size

    185KB

  • Sample

    240509-gnyncsgd38

  • MD5

    28995c680fb5acc639d9c48751cc5ff7

  • SHA1

    cd25ce38913b4159c9249afe194da67b32a7e8e6

  • SHA256

    e537247b6db69c61d5de278cc02f6adc2478bbbc8377a36aea4b0ed6d9a04b5f

  • SHA512

    bdd6eeac499dd533a153178d854c6745db918def6d45784175c45793804f1ba861065389bfc7bbac55594595b9dbbaa2a55cdbdf80938ecda5f70712b1debfc1

  • SSDEEP

    1536:qI491Y2wcI491Y2w+4tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9PXljl:A4tcTvjvTY140818tIP4ovpO1jnyPs

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://loungegangnam.com/4W/dz/

exe.dropper

http://indyoverheaddoors.com/wp-includes/pZ/

exe.dropper

http://geoffoglemusic.com/wp-admin/w/

exe.dropper

http://giral2.com/wp-includes/0e/

exe.dropper

https://www.lunalysis.com/wordpress/syb/

exe.dropper

http://farli.com/cgi-bin/jK/

exe.dropper

http://goldcoastoffice365.com/temp/wQ/

Targets

    • Target

      28995c680fb5acc639d9c48751cc5ff7_JaffaCakes118

    • Size

      185KB

    • MD5

      28995c680fb5acc639d9c48751cc5ff7

    • SHA1

      cd25ce38913b4159c9249afe194da67b32a7e8e6

    • SHA256

      e537247b6db69c61d5de278cc02f6adc2478bbbc8377a36aea4b0ed6d9a04b5f

    • SHA512

      bdd6eeac499dd533a153178d854c6745db918def6d45784175c45793804f1ba861065389bfc7bbac55594595b9dbbaa2a55cdbdf80938ecda5f70712b1debfc1

    • SSDEEP

      1536:qI491Y2wcI491Y2w+4tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9PXljl:A4tcTvjvTY140818tIP4ovpO1jnyPs

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks