General

  • Target

    63a61401ad7519d7da866908823ce3ac_JaffaCakes118

  • Size

    169KB

  • Sample

    240521-r1d5lahd34

  • MD5

    63a61401ad7519d7da866908823ce3ac

  • SHA1

    e86be257ea57eb93fe636ff629b8f55560dfa33c

  • SHA256

    cb0e277830f887c3f59725a4c7388bb0a8053518414d95f6831f1e8f4672865d

  • SHA512

    1fd4a6be0d6bf1b01252d0c8a86639568416aeb2ff1ebb0f429f1012376e78b2f22e458d6ae4fe49ae35ba96d77d76d185b2efbf3c02a76cd66c09f9fbbec34a

  • SSDEEP

    1536:vGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xiP+rIiZo7dLeqH74OC+pO4am35Ha:trfrzOH98ipgalqSm

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://theccwork.com/mail.theccwork.com/IJp/

exe.dropper

https://www.retirementprofessional.com/wp-admin/tjQ/

exe.dropper

https://writingfromling.live/wp-admin/GL/

exe.dropper

http://shahqutubuddin.org/ix/

exe.dropper

https://jumpstart.store/wp-admin/q/

exe.dropper

https://aidenshirt.com/wp-admin/e6f/

exe.dropper

https://edenrug.store/wp-admin/H/

Targets

    • Target

      63a61401ad7519d7da866908823ce3ac_JaffaCakes118

    • Size

      169KB

    • MD5

      63a61401ad7519d7da866908823ce3ac

    • SHA1

      e86be257ea57eb93fe636ff629b8f55560dfa33c

    • SHA256

      cb0e277830f887c3f59725a4c7388bb0a8053518414d95f6831f1e8f4672865d

    • SHA512

      1fd4a6be0d6bf1b01252d0c8a86639568416aeb2ff1ebb0f429f1012376e78b2f22e458d6ae4fe49ae35ba96d77d76d185b2efbf3c02a76cd66c09f9fbbec34a

    • SSDEEP

      1536:vGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xiP+rIiZo7dLeqH74OC+pO4am35Ha:trfrzOH98ipgalqSm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks