General

  • Target

    3daba1a4928d4cd42331af404855f687_JaffaCakes118

  • Size

    226KB

  • Sample

    240514-dpep4aha87

  • MD5

    3daba1a4928d4cd42331af404855f687

  • SHA1

    fafe75a79fe587c4968ee07a3469b191c6e99f41

  • SHA256

    b29fe3fb2b9909a94ea8f079abc7ea994cb8d225a327222bee2c85a5480bb32c

  • SHA512

    5d207e92d98d078d048163f3adf08862bd85dd34be9dfce063830242c64af34adf3ea79bfe63597d654572c4592ec716510450b0480d7db49e1901fa61c2621b

  • SSDEEP

    3072:fEd93LpGo0aQLh7nc7jWR4aKJtWsDbhl36EhX8TC7qU:fEd2Vxc7jWRrcdvhlqQX37qU

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://suamaygiatduchung.com/wp-admin/js/bkgiovu2mxS

exe.dropper

http://tjrtrainings.com/bhVVXzfNXCxrj3_dV

exe.dropper

http://song.lpbes.org/oKDGT3HnwA_9u

exe.dropper

http://ditib.center/2OTZiNbRxnb2

exe.dropper

http://www.gelectronics.in/wordpress/wp-content/ETGjNx1_g

Targets

    • Target

      3daba1a4928d4cd42331af404855f687_JaffaCakes118

    • Size

      226KB

    • MD5

      3daba1a4928d4cd42331af404855f687

    • SHA1

      fafe75a79fe587c4968ee07a3469b191c6e99f41

    • SHA256

      b29fe3fb2b9909a94ea8f079abc7ea994cb8d225a327222bee2c85a5480bb32c

    • SHA512

      5d207e92d98d078d048163f3adf08862bd85dd34be9dfce063830242c64af34adf3ea79bfe63597d654572c4592ec716510450b0480d7db49e1901fa61c2621b

    • SSDEEP

      3072:fEd93LpGo0aQLh7nc7jWR4aKJtWsDbhl36EhX8TC7qU:fEd2Vxc7jWRrcdvhlqQX37qU

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks