General

  • Target

    6ee7ca73b2a8f7ebbdc702a584a6ab4a_JaffaCakes118

  • Size

    132KB

  • Sample

    240524-scksxahh8z

  • MD5

    6ee7ca73b2a8f7ebbdc702a584a6ab4a

  • SHA1

    7823d19d694e0d87f328cab903a1ab9631bfd327

  • SHA256

    561a3a5269e77e0789555a8791fe2d0b51f4e43607fc58ad02c60cf3aad8b5e1

  • SHA512

    3f20695422d87696b7f6c2d04a590c91a7d31e08aca1998df10d9a2c70456a9c9a43fb8d182646a5ee292ed3cb9a5a9db90221414a73d448af470e1ce8904bbe

  • SSDEEP

    3072:A8GhDS0o9zTGOZD6EbzCd3WiWCAWcWvfxa:eoUOZDlbe3WiWCAWcWvfxa

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://levifca.com/y0tYhnWQ

exe.dropper

http://mfpvision.com/yAkPNiSmm6

exe.dropper

http://haganelectronics.rubickdesigns.com/C96xSAAy2q

exe.dropper

http://catairdrones.com/sMQ0n8nNun

exe.dropper

http://radio312.com/mp0NHN4cHX

Targets

    • Target

      6ee7ca73b2a8f7ebbdc702a584a6ab4a_JaffaCakes118

    • Size

      132KB

    • MD5

      6ee7ca73b2a8f7ebbdc702a584a6ab4a

    • SHA1

      7823d19d694e0d87f328cab903a1ab9631bfd327

    • SHA256

      561a3a5269e77e0789555a8791fe2d0b51f4e43607fc58ad02c60cf3aad8b5e1

    • SHA512

      3f20695422d87696b7f6c2d04a590c91a7d31e08aca1998df10d9a2c70456a9c9a43fb8d182646a5ee292ed3cb9a5a9db90221414a73d448af470e1ce8904bbe

    • SSDEEP

      3072:A8GhDS0o9zTGOZD6EbzCd3WiWCAWcWvfxa:eoUOZDlbe3WiWCAWcWvfxa

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks