General

  • Target

    4a7cf3b14c448fcdfad361759f1c5230_JaffaCakes118

  • Size

    266KB

  • Sample

    240516-lvh9gaeh31

  • MD5

    4a7cf3b14c448fcdfad361759f1c5230

  • SHA1

    347b01cd79da6ad16f92a89e6c68820cddfde3e6

  • SHA256

    1637bd41d48d4a751f779e6586d2068b19ec05baaf0f9484585159aba24064c3

  • SHA512

    41c667f54e421566592eff53a21eabed4cb05c48ac39787d8458052007f0ab9bdf01b510308c35dd5c96f65d7199689201eacf23ff224dfc2a562ad58b879d08

  • SSDEEP

    3072:SkhgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPw45xUB5BECCc:SCwQK3RpVS7G4SVuz1QzLhxztsZGPwT

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mimiabner.com/bqJkeK7

exe.dropper

http://assinospalacehotel.com/a0NHaFNAa

exe.dropper

http://jaspinformatica.com/tlkZbfDBR

exe.dropper

http://ulco.tv/z5GQzVhSqH

exe.dropper

http://billfritzjr.com/uOIIIykS

Targets

    • Target

      4a7cf3b14c448fcdfad361759f1c5230_JaffaCakes118

    • Size

      266KB

    • MD5

      4a7cf3b14c448fcdfad361759f1c5230

    • SHA1

      347b01cd79da6ad16f92a89e6c68820cddfde3e6

    • SHA256

      1637bd41d48d4a751f779e6586d2068b19ec05baaf0f9484585159aba24064c3

    • SHA512

      41c667f54e421566592eff53a21eabed4cb05c48ac39787d8458052007f0ab9bdf01b510308c35dd5c96f65d7199689201eacf23ff224dfc2a562ad58b879d08

    • SSDEEP

      3072:SkhgqkhgACSQKaSx+SbtYqS4fvS7GQRbSVuz1QzC9klhxztsZ5QPw45xUB5BECCc:SCwQK3RpVS7G4SVuz1QzLhxztsZGPwT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks