General

  • Target

    69456ac63b43e73f2640f74e77e06cde_JaffaCakes118

  • Size

    213KB

  • Sample

    240523-bra4ksge74

  • MD5

    69456ac63b43e73f2640f74e77e06cde

  • SHA1

    7cce2bfd0f5ef92391c8050e8b81f043052c9a9a

  • SHA256

    a405f145ff2577b8895565e687c785ca8394c66d48784d10ab47652d3f48bafc

  • SHA512

    0d1c693771c400a8cc1e5498532d13f87b348465e132e0681c3f59676ce36316e8df7ad6f2a932da3a0072dd4e10794de6ae0c976d6a3f4e320790233c1cefc3

  • SSDEEP

    3072:u22TWTogk079THcpOu5UZu0/6tJR6R8fo:u/TX07hHcJQetT6RAo

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.1plus-agency.com/tmp/nlr08Z0/

exe.dropper

http://winadev.com/uglot/iiClU/

exe.dropper

https://enews.enkj.com/wordpress/h62/

exe.dropper

https://apicosto.misco-furniture.com/dvzmj/0xm3yS/

exe.dropper

http://drbeatrice.com/wp-content/HSz/

exe.dropper

https://ienerpro.com/cgi-bin/VVwhOR/

exe.dropper

https://premierbarsamui.com/Irc/O/

Targets

    • Target

      69456ac63b43e73f2640f74e77e06cde_JaffaCakes118

    • Size

      213KB

    • MD5

      69456ac63b43e73f2640f74e77e06cde

    • SHA1

      7cce2bfd0f5ef92391c8050e8b81f043052c9a9a

    • SHA256

      a405f145ff2577b8895565e687c785ca8394c66d48784d10ab47652d3f48bafc

    • SHA512

      0d1c693771c400a8cc1e5498532d13f87b348465e132e0681c3f59676ce36316e8df7ad6f2a932da3a0072dd4e10794de6ae0c976d6a3f4e320790233c1cefc3

    • SSDEEP

      3072:u22TWTogk079THcpOu5UZu0/6tJR6R8fo:u/TX07hHcJQetT6RAo

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks