General

  • Target

    433d1c9886f80dec2b6b92a5d6b54ec1_JaffaCakes118

  • Size

    177KB

  • Sample

    240514-1w26asad3w

  • MD5

    433d1c9886f80dec2b6b92a5d6b54ec1

  • SHA1

    fb08fc01e8b25ca1a88534b5994a7fea977065bf

  • SHA256

    860c5f447f202c55885fc12b01dae4464cb7a2813113a03099954d6e2487f437

  • SHA512

    e983e22b269f5abc10d52a2448d8aee3bdce01a3021f7404de33e2a50763ba6158597bf8955363739ed7ade40b2b0d0eacfd7ef38ba1ffa890a7a662447f9e0b

  • SSDEEP

    3072:V4PrXcuQuvpzm4bkiaMQgAlSmrvsPhlqwjZVPg:iDRv1m4bnQgISevsPfqwjZ5g

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://avtoshoolvsa.zt.ua/bin/N/

exe.dropper

http://rootsroundup.com/css/98Y1F8/

exe.dropper

http://riqam.com/wp-content/sW/

exe.dropper

http://ronymotto.com/wp-content/v/

exe.dropper

http://exithum.com.br/Folder_Lean_Jun/0/

exe.dropper

http://schonlinepvc.com/test/dDS/

exe.dropper

http://m3wealth.com/mt-content/UskDK/

Targets

    • Target

      433d1c9886f80dec2b6b92a5d6b54ec1_JaffaCakes118

    • Size

      177KB

    • MD5

      433d1c9886f80dec2b6b92a5d6b54ec1

    • SHA1

      fb08fc01e8b25ca1a88534b5994a7fea977065bf

    • SHA256

      860c5f447f202c55885fc12b01dae4464cb7a2813113a03099954d6e2487f437

    • SHA512

      e983e22b269f5abc10d52a2448d8aee3bdce01a3021f7404de33e2a50763ba6158597bf8955363739ed7ade40b2b0d0eacfd7ef38ba1ffa890a7a662447f9e0b

    • SSDEEP

      3072:V4PrXcuQuvpzm4bkiaMQgAlSmrvsPhlqwjZVPg:iDRv1m4bnQgISevsPfqwjZ5g

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks