General

  • Target

    7a14d7766a1a955fde9b170fc768e890_JaffaCakes118

  • Size

    185KB

  • Sample

    240527-w3nt2aec72

  • MD5

    7a14d7766a1a955fde9b170fc768e890

  • SHA1

    0975064d4d7731263cccf9a200bb64a12c89a895

  • SHA256

    75698eb6a16c78218f243d1afc6f799c7d69845d9d038d532d2732a2eaf3ef04

  • SHA512

    1b27bd174a14c5215288b753438cfe04417e1e32bb173b6fefb1a60edd2fa9bc201ee87f2ff7f88fdde1f026ec30c39d81ef559eb1c24abdee994794f3b5a7f2

  • SSDEEP

    1536:qI491Y2wcI491Y2w+4tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9HXljJ:A4tcTvjvTY140818tIP4ovpG1jnWPM

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://loungegangnam.com/4W/dz/

exe.dropper

http://indyoverheaddoors.com/wp-includes/pZ/

exe.dropper

http://geoffoglemusic.com/wp-admin/w/

exe.dropper

http://giral2.com/wp-includes/0e/

exe.dropper

https://www.lunalysis.com/wordpress/syb/

exe.dropper

http://farli.com/cgi-bin/jK/

exe.dropper

http://goldcoastoffice365.com/temp/wQ/

Targets

    • Target

      7a14d7766a1a955fde9b170fc768e890_JaffaCakes118

    • Size

      185KB

    • MD5

      7a14d7766a1a955fde9b170fc768e890

    • SHA1

      0975064d4d7731263cccf9a200bb64a12c89a895

    • SHA256

      75698eb6a16c78218f243d1afc6f799c7d69845d9d038d532d2732a2eaf3ef04

    • SHA512

      1b27bd174a14c5215288b753438cfe04417e1e32bb173b6fefb1a60edd2fa9bc201ee87f2ff7f88fdde1f026ec30c39d81ef559eb1c24abdee994794f3b5a7f2

    • SSDEEP

      1536:qI491Y2wcI491Y2w+4tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9HXljJ:A4tcTvjvTY140818tIP4ovpG1jnWPM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks