General

  • Target

    3a5cf6add13394d9bc5d9bc02ba42013_JaffaCakes118

  • Size

    241KB

  • Sample

    240512-qtj7lagf71

  • MD5

    3a5cf6add13394d9bc5d9bc02ba42013

  • SHA1

    55d9298b16c53e211d481b28a385664e26681e77

  • SHA256

    c5c43523a3a4685e12351e8399e8b5cb13790ba54ad09e470578f0ec70a0122f

  • SHA512

    90ae27eed1a68afbff472859766e17e4f2aca1c5250b92ab8645e4b4e064b29154cec624e43882f415ee3bdf51732f6d42f7f21cc8b4f0c4311d0284d9b290eb

  • SSDEEP

    3072:wYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////4:40uXnWFchmmcI/o1//Ofc7

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.ksgresearch.org/LLC/z9B/

exe.dropper

http://www.mitrausahacontrucion.com/multifunctional-section/X2v4XN/

exe.dropper

http://daprofesional.com/data4/rsdbA1h/

exe.dropper

http://degisimkalip.com.tr/wp-admin/ZML/

exe.dropper

http://da-industrial.com/js/6GGA48AK/

exe.dropper

http://cse-engineer.com/cgi-bin/BOiL/

exe.dropper

http://casabeethovenlb.com/classes/7SUlG/

Targets

    • Target

      3a5cf6add13394d9bc5d9bc02ba42013_JaffaCakes118

    • Size

      241KB

    • MD5

      3a5cf6add13394d9bc5d9bc02ba42013

    • SHA1

      55d9298b16c53e211d481b28a385664e26681e77

    • SHA256

      c5c43523a3a4685e12351e8399e8b5cb13790ba54ad09e470578f0ec70a0122f

    • SHA512

      90ae27eed1a68afbff472859766e17e4f2aca1c5250b92ab8645e4b4e064b29154cec624e43882f415ee3bdf51732f6d42f7f21cc8b4f0c4311d0284d9b290eb

    • SSDEEP

      3072:wYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////4:40uXnWFchmmcI/o1//Ofc7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks