General

  • Target

    442c34d90c767439f1f022986e40f730_JaffaCakes118

  • Size

    1KB

  • Sample

    240515-cw3vtsdc72

  • MD5

    442c34d90c767439f1f022986e40f730

  • SHA1

    6c088682b116ed593431e38f59003a433cd49a90

  • SHA256

    b97f553e304212360894201f71c1c1e3638096255da86f6af00ed35e4b3d1667

  • SHA512

    cc104c5ee40b3578c2f6f92a4ce1288a26f7a48abf72e2ae9ccc61c81884f96b7de140a2ab925970acf5170b735ecfa9a5d47b6a1353550a0c6931e98cff19c8

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://ufile.io/jho3j

Targets

    • Target

      442c34d90c767439f1f022986e40f730_JaffaCakes118

    • Size

      1KB

    • MD5

      442c34d90c767439f1f022986e40f730

    • SHA1

      6c088682b116ed593431e38f59003a433cd49a90

    • SHA256

      b97f553e304212360894201f71c1c1e3638096255da86f6af00ed35e4b3d1667

    • SHA512

      cc104c5ee40b3578c2f6f92a4ce1288a26f7a48abf72e2ae9ccc61c81884f96b7de140a2ab925970acf5170b735ecfa9a5d47b6a1353550a0c6931e98cff19c8

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks