General

  • Target

    68c60e161362f9f21be0e2069fc05093_JaffaCakes118

  • Size

    227KB

  • Sample

    240522-1v24xaad4w

  • MD5

    68c60e161362f9f21be0e2069fc05093

  • SHA1

    a98954941545419fd613755d12023d83065e6c51

  • SHA256

    46bbb2bd635097e18804f6d1f60b8705220eeaae2b5a4edc01f3d275e618cb21

  • SHA512

    1f2804c0fe808c15830b7c007497288b4837e151f93b95b60fc8eeee777cfd3a09b810b817df6d0848eb976dd9d4ac585230e7c2530897a8048b2ce3ebd53fc2

  • SSDEEP

    3072:1j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkOl3O+zzqGwobR9r:1HgtEWPsL/aTyT9GkOle+zzNwobR9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.hammockworld.co.nz/imgs/xyTBsz/

exe.dropper

http://seatrade.com.eg/index_files/OGUwzJl/

exe.dropper

http://www.nancywhite-realtor.com/wp-content/qavvddXh/

exe.dropper

http://skullmedia.de/befroe.de/eyiY/

exe.dropper

https://damoshushu.com/wp-content/xhcurZgXJ/

Targets

    • Target

      68c60e161362f9f21be0e2069fc05093_JaffaCakes118

    • Size

      227KB

    • MD5

      68c60e161362f9f21be0e2069fc05093

    • SHA1

      a98954941545419fd613755d12023d83065e6c51

    • SHA256

      46bbb2bd635097e18804f6d1f60b8705220eeaae2b5a4edc01f3d275e618cb21

    • SHA512

      1f2804c0fe808c15830b7c007497288b4837e151f93b95b60fc8eeee777cfd3a09b810b817df6d0848eb976dd9d4ac585230e7c2530897a8048b2ce3ebd53fc2

    • SSDEEP

      3072:1j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkOl3O+zzqGwobR9r:1HgtEWPsL/aTyT9GkOle+zzNwobR9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks