General

  • Target

    639d160bc8ff8c32f76ef5eb7608c41e_JaffaCakes118

  • Size

    186KB

  • Sample

    240521-rswpnsha96

  • MD5

    639d160bc8ff8c32f76ef5eb7608c41e

  • SHA1

    51c62b88f2d71e63820e491e3b68d3f30c6c05a6

  • SHA256

    fe13cec5151195e923fd7999dcebf80b566a7bd3fbda82c9e02f266e9f3eb4df

  • SHA512

    020c3c1b26273d4924ea18c8423dcb1c3a6a13208a1e8095146921e3af2fb617bd09fe3a0c56a7dd3f6acd7d5ad8c099c5404957b0486dbbfc060d38bb084133

  • SSDEEP

    1536:tGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xildYXY9YgddT/Ephoj18sov8sCAl:zrfrzOH98ipgWexR

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://scrappy.upsproutmedia.com/wp-admin/J/

exe.dropper

https://china-specialist.com/wp-content/YrLG/

exe.dropper

https://www.upsproutmedia.com/wp-admin/M/

exe.dropper

http://pagearrow.com/wordpress/B/

exe.dropper

http://a.xuezha.cn/lajop/OYdUzf/

exe.dropper

http://blog.saadata.com/cgi-bin/vwz/

exe.dropper

http://zeeamfashion.com/content/rqoL/

Targets

    • Target

      639d160bc8ff8c32f76ef5eb7608c41e_JaffaCakes118

    • Size

      186KB

    • MD5

      639d160bc8ff8c32f76ef5eb7608c41e

    • SHA1

      51c62b88f2d71e63820e491e3b68d3f30c6c05a6

    • SHA256

      fe13cec5151195e923fd7999dcebf80b566a7bd3fbda82c9e02f266e9f3eb4df

    • SHA512

      020c3c1b26273d4924ea18c8423dcb1c3a6a13208a1e8095146921e3af2fb617bd09fe3a0c56a7dd3f6acd7d5ad8c099c5404957b0486dbbfc060d38bb084133

    • SSDEEP

      1536:tGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xildYXY9YgddT/Ephoj18sov8sCAl:zrfrzOH98ipgWexR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks