General

  • Target

    659add061c8bc28177202ec8b7b5e247_JaffaCakes118

  • Size

    160KB

  • Sample

    240522-cc17wsgf87

  • MD5

    659add061c8bc28177202ec8b7b5e247

  • SHA1

    be6353470a0f663b035118644271ecf3615ab767

  • SHA256

    2bbcef2cf92b3592e44ed056a95dc42021e3699c56c8126144934a4b10fd2a2b

  • SHA512

    05bce337c7d35a6903b4f70fec8a92ae299b58349456885d3d5aef6174c267d5144f8f701ea34218f4acc056e4e158f7804849b22036e96a3a71743889b96675

  • SSDEEP

    1536:8Ij9atFqpRIj9atFqpvrdi1Ir77zOH98Wj2gpngB+a9z5U3N7NS7uS:2rfrzOH98ipgBm7NS7r

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://templatejson.com/awrrn/Kw10uo/

exe.dropper

https://hosting.mybestheme.com/aikjj0q/8/

exe.dropper

https://tastes2plate.com/wp-content/uploads/6/

exe.dropper

http://madeirawildlife.com/wp-admin/zuWZW/

exe.dropper

http://senyumdesa.org/wp-admin/aC4/

exe.dropper

https://ibuyoldwebsites.com/modules/QVtEr7/

exe.dropper

http://blog.zunapro.com/wp-admin/js/widgets/EH4agl/

Targets

    • Target

      659add061c8bc28177202ec8b7b5e247_JaffaCakes118

    • Size

      160KB

    • MD5

      659add061c8bc28177202ec8b7b5e247

    • SHA1

      be6353470a0f663b035118644271ecf3615ab767

    • SHA256

      2bbcef2cf92b3592e44ed056a95dc42021e3699c56c8126144934a4b10fd2a2b

    • SHA512

      05bce337c7d35a6903b4f70fec8a92ae299b58349456885d3d5aef6174c267d5144f8f701ea34218f4acc056e4e158f7804849b22036e96a3a71743889b96675

    • SSDEEP

      1536:8Ij9atFqpRIj9atFqpvrdi1Ir77zOH98Wj2gpngB+a9z5U3N7NS7uS:2rfrzOH98ipgBm7NS7r

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks