General

  • Target

    69886e9d7b37316420cf3c7fe6f889ce_JaffaCakes118

  • Size

    189KB

  • Sample

    240523-dklylsbg65

  • MD5

    69886e9d7b37316420cf3c7fe6f889ce

  • SHA1

    03be38339a630f775ce4ad3034ea7f1a4b90e14b

  • SHA256

    aae82415f0c1d33438261bb6ea1039cdff8bccc786541f5177e6938497f5b2d1

  • SHA512

    80d98ec533611a1d09e33041d1fe456364fb583c5d111d66cd288238e4bff26e80d2440de86e9601adcaa2e39dc1854c60249129cf401da6b3916ab2b8f56711

  • SSDEEP

    1536:rrdi1Ir77zOH98Wj2gpngt+a9SG37MgT7TxZk5tBRt9k6N+A:rrfrzOH98ipgnrMgT3ytHt9ZN+A

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://geisterhouse.com/cgi-bin/LAb1/

exe.dropper

http://amyemitchell.com/themes/w/

exe.dropper

http://forestanalytics.net/images/57A7/

exe.dropper

https://konican.com/cgi-bin/cWu/

exe.dropper

http://strike3productions.com/squad/3aV6xrH/

exe.dropper

http://riandutra.com/img/wOMENgh/

exe.dropper

http://justinscott.com.au/sites/rRS/

Targets

    • Target

      69886e9d7b37316420cf3c7fe6f889ce_JaffaCakes118

    • Size

      189KB

    • MD5

      69886e9d7b37316420cf3c7fe6f889ce

    • SHA1

      03be38339a630f775ce4ad3034ea7f1a4b90e14b

    • SHA256

      aae82415f0c1d33438261bb6ea1039cdff8bccc786541f5177e6938497f5b2d1

    • SHA512

      80d98ec533611a1d09e33041d1fe456364fb583c5d111d66cd288238e4bff26e80d2440de86e9601adcaa2e39dc1854c60249129cf401da6b3916ab2b8f56711

    • SSDEEP

      1536:rrdi1Ir77zOH98Wj2gpngt+a9SG37MgT7TxZk5tBRt9k6N+A:rrfrzOH98ipgnrMgT3ytHt9ZN+A

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks