General

  • Target

    2fe7f65dcce5241b8f40f3f40490c575_JaffaCakes118

  • Size

    163KB

  • Sample

    240510-te1sksdg3w

  • MD5

    2fe7f65dcce5241b8f40f3f40490c575

  • SHA1

    922a4be6a8a9b965d58f919f5f8638efd53a45bf

  • SHA256

    429640344ceeb02f20848b6aa0881bb97191972235419d97859adf9e6762369b

  • SHA512

    179dff82f6657a65e1580a0ab54b9dffde335626ef548954f731f4f74279d3a31deed910ff3f5dca091181b9c0cd94ca36012b59004cf088c1d38befd3b88ac7

  • SSDEEP

    3072:NfCMbu1Ty+crapcOWNt9kXBmfE7qdmVJKk/Juvc5a8aHXdd:Nf1uc+SZhXdd

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.removepctrojan.com/wp-admin/K/

exe.dropper

https://theshaywest.com/wp-admin/V/

exe.dropper

http://carstarai.com/stats/D/

exe.dropper

http://financiamentointeligente.com/wp-content/F/

exe.dropper

http://banglashongbad.com/wp-content/sW/

exe.dropper

http://www.sff3d.com/3d/D/

exe.dropper

https://emmaidea.com/wp-includes/q/

Targets

    • Target

      2fe7f65dcce5241b8f40f3f40490c575_JaffaCakes118

    • Size

      163KB

    • MD5

      2fe7f65dcce5241b8f40f3f40490c575

    • SHA1

      922a4be6a8a9b965d58f919f5f8638efd53a45bf

    • SHA256

      429640344ceeb02f20848b6aa0881bb97191972235419d97859adf9e6762369b

    • SHA512

      179dff82f6657a65e1580a0ab54b9dffde335626ef548954f731f4f74279d3a31deed910ff3f5dca091181b9c0cd94ca36012b59004cf088c1d38befd3b88ac7

    • SSDEEP

      3072:NfCMbu1Ty+crapcOWNt9kXBmfE7qdmVJKk/Juvc5a8aHXdd:Nf1uc+SZhXdd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks