General

  • Target

    7e05d8335d33b651ec8e2ffa5ffbb57c_JaffaCakes118

  • Size

    138KB

  • Sample

    240528-xktg8shb29

  • MD5

    7e05d8335d33b651ec8e2ffa5ffbb57c

  • SHA1

    6e9bc912f2374e113cae16f85bc71d018a111a49

  • SHA256

    d3ccaae12dd7d1b9ca03578eb78aa19862806d452b3d6515b59551389b13418c

  • SHA512

    52da6ad45ef88519fbfc997a2bfdc7b8a8902479ea1ead58406e60899b48d7c7751bbbaf49490cfada7e36ed308ff829543a26f90e6e119bb735cb1451b630d4

  • SSDEEP

    3072:+hyvJOFiAZU8YbMhv3O3b9VAWKOHBjmCdvaktxH:+hyRoiAZU6PA5VAdQjmCdv/X

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mncprojects.com/qyICGbxbB

exe.dropper

http://privateinvestigatorbroward.com/MG2E1q8KC

exe.dropper

http://lar.biz/zlEUch3D

exe.dropper

http://mhni.xyz/OofZ0m8

exe.dropper

http://labuzzance.com/mrU9Np68zu

Targets

    • Target

      7e05d8335d33b651ec8e2ffa5ffbb57c_JaffaCakes118

    • Size

      138KB

    • MD5

      7e05d8335d33b651ec8e2ffa5ffbb57c

    • SHA1

      6e9bc912f2374e113cae16f85bc71d018a111a49

    • SHA256

      d3ccaae12dd7d1b9ca03578eb78aa19862806d452b3d6515b59551389b13418c

    • SHA512

      52da6ad45ef88519fbfc997a2bfdc7b8a8902479ea1ead58406e60899b48d7c7751bbbaf49490cfada7e36ed308ff829543a26f90e6e119bb735cb1451b630d4

    • SSDEEP

      3072:+hyvJOFiAZU8YbMhv3O3b9VAWKOHBjmCdvaktxH:+hyRoiAZU6PA5VAdQjmCdv/X

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks