General

  • Target

    68f65871f36e2d1053fdc94c325c666e_JaffaCakes118

  • Size

    31KB

  • Sample

    240522-27thzacf9z

  • MD5

    68f65871f36e2d1053fdc94c325c666e

  • SHA1

    b8e4fcdd25cac949cfb8e5af10c20f0d9a819bc2

  • SHA256

    8adf64000dda34334dd18581022e68206b9b4f2871700f9e8b0176f9dfc2cecb

  • SHA512

    df9b28fbe881970bd5746360c4e77ec85f317899891aacc5adda6126beee91fe0117d1d9d21a0621393f361843f755f8199737566dee5b2ea22d3e9b160b63d2

  • SSDEEP

    768:+e2mLWvpMQH8b/KN13u/HPPBD2IWNpHOjyefFYRtiQE0rFwT3uBLeXEJ:+e2TBMQH8omqBF

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.198.57.172/faazdfdsxm.exe?XVMtv

Targets

    • Target

      68f65871f36e2d1053fdc94c325c666e_JaffaCakes118

    • Size

      31KB

    • MD5

      68f65871f36e2d1053fdc94c325c666e

    • SHA1

      b8e4fcdd25cac949cfb8e5af10c20f0d9a819bc2

    • SHA256

      8adf64000dda34334dd18581022e68206b9b4f2871700f9e8b0176f9dfc2cecb

    • SHA512

      df9b28fbe881970bd5746360c4e77ec85f317899891aacc5adda6126beee91fe0117d1d9d21a0621393f361843f755f8199737566dee5b2ea22d3e9b160b63d2

    • SSDEEP

      768:+e2mLWvpMQH8b/KN13u/HPPBD2IWNpHOjyefFYRtiQE0rFwT3uBLeXEJ:+e2TBMQH8omqBF

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

2
T1059

PowerShell

1
T1059.001

JavaScript

1
T1059.007

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks