General

  • Target

    621c5e53d558797d0e4494eed4fa9cd1JaffaCakes118

  • Size

    187KB

  • Sample

    240523-ashdlseh57

  • MD5

    621c5e53d558797d0e4494eed4fa9cd1

  • SHA1

    843fd69f28b862b75bc8cb9028b0bc009e907caa

  • SHA256

    fc8aa6f97026b3ab9940022d409504d275d0dd4a9a1cb02ce00fde0ab46f54be

  • SHA512

    70415120b6190e020069ad5942708826e7f043be794e875593da385029a67c204ce7098122e739149fec08e04ebdf41c6265dc7feee6c568e67acd210023dc4d

  • SSDEEP

    1536:tGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xildYXY9YgddT/Ephoj18sov8sCAd:zrfrzOH98ipg4ejZ

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://scrappy.upsproutmedia.com/wp-admin/J/

exe.dropper

https://china-specialist.com/wp-content/YrLG/

exe.dropper

https://www.upsproutmedia.com/wp-admin/M/

exe.dropper

http://pagearrow.com/wordpress/B/

exe.dropper

http://a.xuezha.cn/lajop/OYdUzf/

exe.dropper

http://blog.saadata.com/cgi-bin/vwz/

exe.dropper

http://zeeamfashion.com/content/rqoL/

Targets

    • Target

      621c5e53d558797d0e4494eed4fa9cd1JaffaCakes118

    • Size

      187KB

    • MD5

      621c5e53d558797d0e4494eed4fa9cd1

    • SHA1

      843fd69f28b862b75bc8cb9028b0bc009e907caa

    • SHA256

      fc8aa6f97026b3ab9940022d409504d275d0dd4a9a1cb02ce00fde0ab46f54be

    • SHA512

      70415120b6190e020069ad5942708826e7f043be794e875593da385029a67c204ce7098122e739149fec08e04ebdf41c6265dc7feee6c568e67acd210023dc4d

    • SSDEEP

      1536:tGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xildYXY9YgddT/Ephoj18sov8sCAd:zrfrzOH98ipg4ejZ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks