General

  • Target

    65c1b7e830158f8b0cecb98ce5f3314a_JaffaCakes118

  • Size

    177KB

  • Sample

    240522-dck2caaa45

  • MD5

    65c1b7e830158f8b0cecb98ce5f3314a

  • SHA1

    5f418d4fa57c6729975f400df437fd1320caf718

  • SHA256

    a4ea07f63c702a260cfc87703c09e635cf2fab0a0ed510439a57936ee5f6d4b8

  • SHA512

    cf95b68078c7b4e2661ff5fda202b4d8d7b854fdb737883c1b9afff81ec151da832961dc9fe375d4a644af97062823f05407904f4a95e2c0f17e4cd838cd28d6

  • SSDEEP

    1536:d2B72BYrdi1Ir77zOH98Wj2gpngd+a9cqPWjD2kKjHDYs+sbM+Sy1l4:WrfrzOH98ipgUi2SHDYsDM+Sy1l4

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://msmartyford.com/assets/BIO/

exe.dropper

http://jiafunongye.com/application/zh3/

exe.dropper

http://calledtochange.org/CalledtoChange/Uh/

exe.dropper

https://janataralo.com/public_html/k/

exe.dropper

https://www.breedenandsilver.com/wp-content/j/

exe.dropper

http://valleymedicalandsurgicalclinic.com/ujftb/p/

exe.dropper

https://cimsjr.com/hospital/x2f/

Targets

    • Target

      65c1b7e830158f8b0cecb98ce5f3314a_JaffaCakes118

    • Size

      177KB

    • MD5

      65c1b7e830158f8b0cecb98ce5f3314a

    • SHA1

      5f418d4fa57c6729975f400df437fd1320caf718

    • SHA256

      a4ea07f63c702a260cfc87703c09e635cf2fab0a0ed510439a57936ee5f6d4b8

    • SHA512

      cf95b68078c7b4e2661ff5fda202b4d8d7b854fdb737883c1b9afff81ec151da832961dc9fe375d4a644af97062823f05407904f4a95e2c0f17e4cd838cd28d6

    • SSDEEP

      1536:d2B72BYrdi1Ir77zOH98Wj2gpngd+a9cqPWjD2kKjHDYs+sbM+Sy1l4:WrfrzOH98ipgUi2SHDYsDM+Sy1l4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks