General

  • Target

    68f26248d12a0f90b841be966a92f0eb_JaffaCakes118

  • Size

    91KB

  • Sample

    240522-23gzdace43

  • MD5

    68f26248d12a0f90b841be966a92f0eb

  • SHA1

    844f455e80056d6d2d0e28118d16b062cf6b83c7

  • SHA256

    573a40257ce731457d4ecc39bfab7cbc4a77e3235244f75e27b8594d9245201c

  • SHA512

    a030f56a78924dac6db76b886264de24e4b82bc95293bf98dbe796c29edfcb989f26bbd089f61eccec190c17d4dd3c10747063b8a71fb9fa144b03b5c10a9212

  • SSDEEP

    1536:hptJlmrJpmxlRw99NBRC+aTmLI0+FOd7Dz4q:/te2dw99f5+FOd3zL

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://docecreativo.com/dm

exe.dropper

http://cunisoft.com/O

exe.dropper

http://artzkaypharmacy.com.au/BlK0k0

exe.dropper

http://askaconvict.com/KYKuG

exe.dropper

http://atuare.com.br/ef

Targets

    • Target

      68f26248d12a0f90b841be966a92f0eb_JaffaCakes118

    • Size

      91KB

    • MD5

      68f26248d12a0f90b841be966a92f0eb

    • SHA1

      844f455e80056d6d2d0e28118d16b062cf6b83c7

    • SHA256

      573a40257ce731457d4ecc39bfab7cbc4a77e3235244f75e27b8594d9245201c

    • SHA512

      a030f56a78924dac6db76b886264de24e4b82bc95293bf98dbe796c29edfcb989f26bbd089f61eccec190c17d4dd3c10747063b8a71fb9fa144b03b5c10a9212

    • SSDEEP

      1536:hptJlmrJpmxlRw99NBRC+aTmLI0+FOd7Dz4q:/te2dw99f5+FOd3zL

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks