General

  • Target

    68f3c519678516849437b27ca27c7b8e_JaffaCakes118

  • Size

    44KB

  • Sample

    240522-24849ace8y

  • MD5

    68f3c519678516849437b27ca27c7b8e

  • SHA1

    3eaba84c8751e9eb13c2a0f88a188d6d8a0b4e41

  • SHA256

    25a3f2e98eda441b0eb55addd363b0806e1f935702e4b417f3f39be2eecbcc77

  • SHA512

    8d7daaa395275c71f54ea960fc49c1b1cc3b9d16b1f056fc4396d74bd00cf72df9a7e5c8cc01f65923afe2bf4f885d7be41efc70cb270df205b41a4827287bc3

  • SSDEEP

    384:wtf8iSUR/8dATqNLi08krZuHzQjbuMZZzkExygcPEdEsKhb2YOPyg/P0jNItU:C/qAaLiELbZZ19yhEd6yPJ3K

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://54.244.182.87:80

Targets

    • Target

      68f3c519678516849437b27ca27c7b8e_JaffaCakes118

    • Size

      44KB

    • MD5

      68f3c519678516849437b27ca27c7b8e

    • SHA1

      3eaba84c8751e9eb13c2a0f88a188d6d8a0b4e41

    • SHA256

      25a3f2e98eda441b0eb55addd363b0806e1f935702e4b417f3f39be2eecbcc77

    • SHA512

      8d7daaa395275c71f54ea960fc49c1b1cc3b9d16b1f056fc4396d74bd00cf72df9a7e5c8cc01f65923afe2bf4f885d7be41efc70cb270df205b41a4827287bc3

    • SSDEEP

      384:wtf8iSUR/8dATqNLi08krZuHzQjbuMZZzkExygcPEdEsKhb2YOPyg/P0jNItU:C/qAaLiELbZZ19yhEd6yPJ3K

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks