General

  • Target

    359e01ba7a5a96b122689309ae4418a0_JaffaCakes118

  • Size

    199KB

  • Sample

    240511-vhaw1abc45

  • MD5

    359e01ba7a5a96b122689309ae4418a0

  • SHA1

    0b6beb94a0c04959784a0a38751557f2a025ec02

  • SHA256

    256097c163fdfce59d6851ce2e45d29d0f99c2130738e1f52334e447271e725b

  • SHA512

    91fdc20529943c5260921a66f1d8d4ca593aab6572b60ac0085acfe90959775f3e3c8020dcc4547ef01c3d7239f4c6c22ef16cdd3be276d2aad0928fdec66990

  • SSDEEP

    1536:04tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9Zig7ix5EvGtaWWfjPYKw0:04tcTvjvTY140818tIP4ovppLmGAoI

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://veccino56.com/gjpra/4ZR/

exe.dropper

http://girlgeekdinners.com/wp-content/Hpz/

exe.dropper

http://marblingmagpie.com/COPYRIGHT/Ak/

exe.dropper

http://aplicativoipok.net/wp-includes/ONW/

exe.dropper

http://ec2-52-56-233-157.eu-west-2.compute.amazonaws.com/wp-includes/35/

exe.dropper

https://shd7.life/mlktv/r6/

exe.dropper

https://www.hairlineunisexsalon.com/demo/UX/

Targets

    • Target

      359e01ba7a5a96b122689309ae4418a0_JaffaCakes118

    • Size

      199KB

    • MD5

      359e01ba7a5a96b122689309ae4418a0

    • SHA1

      0b6beb94a0c04959784a0a38751557f2a025ec02

    • SHA256

      256097c163fdfce59d6851ce2e45d29d0f99c2130738e1f52334e447271e725b

    • SHA512

      91fdc20529943c5260921a66f1d8d4ca593aab6572b60ac0085acfe90959775f3e3c8020dcc4547ef01c3d7239f4c6c22ef16cdd3be276d2aad0928fdec66990

    • SSDEEP

      1536:04tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9Zig7ix5EvGtaWWfjPYKw0:04tcTvjvTY140818tIP4ovppLmGAoI

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks