General

  • Target

    743bd088b343ed66c14300230661e515_JaffaCakes118

  • Size

    161KB

  • Sample

    240526-ea4w4sed84

  • MD5

    743bd088b343ed66c14300230661e515

  • SHA1

    99145be8579e0a9d2e1c2f7c8f8fed618b61b8a6

  • SHA256

    afd8b17793a28eb8bf21e2577601ccab386cbd446c84ea12a36f79043dc0a0c3

  • SHA512

    9f0c9f3823315234384646c233cfbe97929d8ae67c3c2a5b20ef1ce9db95a31c431f3a93afc6effbfaa2275669c26768616fd693f25f2d167b9dfcaedaefbb19

  • SSDEEP

    1536:T5a/aNrdi1Ir77zOH98Wj2gpngR+a9KxZVDEuEfBzoIOGQ:T/rfrzOH98ipgum5JzovGQ

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://cryptokuota.com/assets/M2ngTrJ/

exe.dropper

https://pinterusmedia.com/wp-admin/YX/

exe.dropper

https://aszcasino.com/aszdemo/DRloh/

exe.dropper

https://dubai-homes.ae/wp-admin/YBJR3M/

exe.dropper

https://whitdoit.tk/ljiy53n/xxE/

exe.dropper

http://4life.com.vn/wp-admin/R/

exe.dropper

http://baran-business.de/wp-content/pMr/

Targets

    • Target

      743bd088b343ed66c14300230661e515_JaffaCakes118

    • Size

      161KB

    • MD5

      743bd088b343ed66c14300230661e515

    • SHA1

      99145be8579e0a9d2e1c2f7c8f8fed618b61b8a6

    • SHA256

      afd8b17793a28eb8bf21e2577601ccab386cbd446c84ea12a36f79043dc0a0c3

    • SHA512

      9f0c9f3823315234384646c233cfbe97929d8ae67c3c2a5b20ef1ce9db95a31c431f3a93afc6effbfaa2275669c26768616fd693f25f2d167b9dfcaedaefbb19

    • SSDEEP

      1536:T5a/aNrdi1Ir77zOH98Wj2gpngR+a9KxZVDEuEfBzoIOGQ:T/rfrzOH98ipgum5JzovGQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks