General

  • Target

    79db7b9eaf5d7f991edd2e7e18e4662d_JaffaCakes118

  • Size

    220KB

  • Sample

    240527-vn2a5sbb41

  • MD5

    79db7b9eaf5d7f991edd2e7e18e4662d

  • SHA1

    17074bb221d4b9af49b27311be48a3456f82e4ad

  • SHA256

    067b6c601b97d9573b74bd1ce702e0e904b1a6853984f51334eb17b7e5394ba5

  • SHA512

    98cb572e25d0e88e44ba148aa828e15190c974124183e5831e80766a233226d2e08dd193110e09932d82c61cc3b653a2ea03a41d14ee5b7a7c340438e206398f

  • SSDEEP

    3072:b4tcTvjvTY140818tIP4ovp5SGju9jDW1M+7yp3S:EtcnvE140o8tIP4ap6jDjmwS

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hottco.com/stats/erd/

exe.dropper

http://dutarini.com/cgi-bin/6/

exe.dropper

https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/

exe.dropper

http://pastaciyiz.biz/wp-includes/fvx/

exe.dropper

https://dogaltrm.com/components/r6h/

exe.dropper

https://dortislem.net/administrator/c/

exe.dropper

https://onyourleftracing.com/cgi-bin/QcC/

Targets

    • Target

      79db7b9eaf5d7f991edd2e7e18e4662d_JaffaCakes118

    • Size

      220KB

    • MD5

      79db7b9eaf5d7f991edd2e7e18e4662d

    • SHA1

      17074bb221d4b9af49b27311be48a3456f82e4ad

    • SHA256

      067b6c601b97d9573b74bd1ce702e0e904b1a6853984f51334eb17b7e5394ba5

    • SHA512

      98cb572e25d0e88e44ba148aa828e15190c974124183e5831e80766a233226d2e08dd193110e09932d82c61cc3b653a2ea03a41d14ee5b7a7c340438e206398f

    • SSDEEP

      3072:b4tcTvjvTY140818tIP4ovp5SGju9jDW1M+7yp3S:EtcnvE140o8tIP4ap6jDjmwS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks