General

  • Target

    68c12af2cfbacf4ff33f6dfaffac037a_JaffaCakes118

  • Size

    25KB

  • Sample

    240522-1qhjpsab21

  • MD5

    68c12af2cfbacf4ff33f6dfaffac037a

  • SHA1

    a913509bd44da40de1170fbce7e9e4f616fb8578

  • SHA256

    3930449b4149acb64fbe41b5ff4c58046881472b2f0e9cd2bdf465f31209b8e8

  • SHA512

    4cc67da7337afe8ed4b2dda25e9378565c00f897226cf954a57ca3b6c240c2e0aabd7460a787a07c7b6a60a5998b6d9447d6196f25c2a934d306efcb12ca2f6d

  • SSDEEP

    768:rqv/II5lrephx35mPGjHiN4kOCOa2PpZiXlWKaaGPRgzh5:rqv/TSHajH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://92.63.197.60/c.exe?RioM

Targets

    • Target

      68c12af2cfbacf4ff33f6dfaffac037a_JaffaCakes118

    • Size

      25KB

    • MD5

      68c12af2cfbacf4ff33f6dfaffac037a

    • SHA1

      a913509bd44da40de1170fbce7e9e4f616fb8578

    • SHA256

      3930449b4149acb64fbe41b5ff4c58046881472b2f0e9cd2bdf465f31209b8e8

    • SHA512

      4cc67da7337afe8ed4b2dda25e9378565c00f897226cf954a57ca3b6c240c2e0aabd7460a787a07c7b6a60a5998b6d9447d6196f25c2a934d306efcb12ca2f6d

    • SSDEEP

      768:rqv/II5lrephx35mPGjHiN4kOCOa2PpZiXlWKaaGPRgzh5:rqv/TSHajH

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

2
T1059

PowerShell

1
T1059.001

JavaScript

1
T1059.007

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks