General

  • Target

    2d27a1f3eeec5fdca3ec80489a324150_JaffaCakes118

  • Size

    244KB

  • Sample

    240510-d8et7sca67

  • MD5

    2d27a1f3eeec5fdca3ec80489a324150

  • SHA1

    329238308b3d8bcc0f8b750e8f688c88f650fcee

  • SHA256

    1d92ed98ab64c028fb00bdb1edb06bd48d9df3a1d6ed665a12bc85fffafc6841

  • SHA512

    a4df8e22c54abd610b3b466011aad460f05968a99a6bddc2e119337179f67e3dcce625fb44691d438cabcbcb0d50b235773507f0121625ecb330968160d4820b

  • SSDEEP

    3072:VUAA3WuH/S6AQn9cfhjcgBYfk1VOGCYGgktDkQktDSOJpDa:ePAsUlcKp1UGCYONnktbZa

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://jshdhqqusjakxmxla.com/MXE/lodpos.php?l=yets3.xt2

Targets

    • Target

      Inquiry.doc

    • Size

      161KB

    • MD5

      025f26017dc70b1b0a14d9900473e5f0

    • SHA1

      543eb170ca0251f1168859e52da41a196fd5efec

    • SHA256

      970926dfba45666a0386f90da19a8c7b1d8e266fbb334de8b77442fe1faefca1

    • SHA512

      774646424a1a79b404e3ba7ccd9bc88ae2f075acf95c0898161a29e676526f75eecf0c2ef7f80651cf6236fadeba793fb1c6062b74150cf8ad935891c6a12121

    • SSDEEP

      3072:tte2dw99f0TYKn2OlbVS6BBbIVR5f76yzYB8:vHdw7OYK2Oiy2VR5f76t8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks