General

  • Target

    688d981d97e8d94de4c86926cc1d0f34_JaffaCakes118

  • Size

    187KB

  • Sample

    240522-zfc1ssfg2s

  • MD5

    688d981d97e8d94de4c86926cc1d0f34

  • SHA1

    4c3c12168a084a85e0459415a9260efaf7be5423

  • SHA256

    89c63f940c17124065f94ee04b40a3cf2f048fb270b93b38fe1b1e937ab4abff

  • SHA512

    1f21b9cab6130aea345bf1e7f85ac178d61ece4d7cc0c01acdcd3111d5c5b7712e7980b86c94c6ae5cab131b59997b4a4acdeae8f09a3b62fd745e278881ce7c

  • SSDEEP

    1536:RGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilATmd8YkYeT/EA8sap8cjufajn4:vrfrzOH98ipgFh5EYr

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://dtyl.shop/wp-content/W68Nx/

exe.dropper

https://star-speed.vip/wp-admin/U2jRIg/

exe.dropper

https://cshub123.cn/wp-admin/Gajs/

exe.dropper

https://viettellogistics.com.vn/wp-content/oS4/

exe.dropper

http://cococat.se/wp-admin/2Oaf/

exe.dropper

http://andresirjan.ir/wp-admin/JSH/

exe.dropper

https://sptrade.com.br/wp-includes/iFZOvL/

Targets

    • Target

      688d981d97e8d94de4c86926cc1d0f34_JaffaCakes118

    • Size

      187KB

    • MD5

      688d981d97e8d94de4c86926cc1d0f34

    • SHA1

      4c3c12168a084a85e0459415a9260efaf7be5423

    • SHA256

      89c63f940c17124065f94ee04b40a3cf2f048fb270b93b38fe1b1e937ab4abff

    • SHA512

      1f21b9cab6130aea345bf1e7f85ac178d61ece4d7cc0c01acdcd3111d5c5b7712e7980b86c94c6ae5cab131b59997b4a4acdeae8f09a3b62fd745e278881ce7c

    • SSDEEP

      1536:RGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilATmd8YkYeT/EA8sap8cjufajn4:vrfrzOH98ipgFh5EYr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks