General

  • Target

    4519806e3591ddc64d6d760fb8ece354_JaffaCakes118

  • Size

    190KB

  • Sample

    240515-h9qqbafb79

  • MD5

    4519806e3591ddc64d6d760fb8ece354

  • SHA1

    739fc2164b1f4ef489d1b98f149ef0dcf882bf9a

  • SHA256

    30c629812a610192dc5b3898cb7b30101d998bf327a9bae06c357cc2108a08a6

  • SHA512

    866e2a2013f8c3445c0f5d30aeeed43e977e34f5b51295653e326d2429678e3218ec7ebfdf096ddb5a0548b437f9a7ddd52a63a709f945d9c6edf2b337fc7a18

  • SSDEEP

    1536:rrdi1Ir77zOH98Wj2gpngt+a9Fi37MgT7TxZk5tBRt9k6P+A:rrfrzOH98ipgsrMgT3ytHt9ZP+A

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://geisterhouse.com/cgi-bin/LAb1/

exe.dropper

http://amyemitchell.com/themes/w/

exe.dropper

http://forestanalytics.net/images/57A7/

exe.dropper

https://konican.com/cgi-bin/cWu/

exe.dropper

http://strike3productions.com/squad/3aV6xrH/

exe.dropper

http://riandutra.com/img/wOMENgh/

exe.dropper

http://justinscott.com.au/sites/rRS/

Targets

    • Target

      4519806e3591ddc64d6d760fb8ece354_JaffaCakes118

    • Size

      190KB

    • MD5

      4519806e3591ddc64d6d760fb8ece354

    • SHA1

      739fc2164b1f4ef489d1b98f149ef0dcf882bf9a

    • SHA256

      30c629812a610192dc5b3898cb7b30101d998bf327a9bae06c357cc2108a08a6

    • SHA512

      866e2a2013f8c3445c0f5d30aeeed43e977e34f5b51295653e326d2429678e3218ec7ebfdf096ddb5a0548b437f9a7ddd52a63a709f945d9c6edf2b337fc7a18

    • SSDEEP

      1536:rrdi1Ir77zOH98Wj2gpngt+a9Fi37MgT7TxZk5tBRt9k6P+A:rrfrzOH98ipgsrMgT3ytHt9ZP+A

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks