General

  • Target

    81ca0187f2279178066a25dde3fb8cce_JaffaCakes118

  • Size

    197KB

  • Sample

    240529-y27xmahd58

  • MD5

    81ca0187f2279178066a25dde3fb8cce

  • SHA1

    f1e75b61556b0f1958d0aa4a7641d8d446718af0

  • SHA256

    b925b0d7be73ff4798ccc9d0da0510ae54f289bbb3fbbb62b410cd8253969d09

  • SHA512

    235f697f80cd5dc542e883b3ff29b0733462b8b6904167bcf3cb3220655afc03672f8e97adbf27c17dc36bb7fd7f34d3a41cb49a3c31c68fdea0f8f392f6888b

  • SSDEEP

    3072:H4PrXcuQuvpzm4bkiaMQgAlSVBgJEsGKh71fwt6:YDRv1m4bnQgISVGJEKhhfwt6

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mealsandwheels.com/backup/3E/

exe.dropper

http://evandijk.eu/4fd2c798720871f16/k/

exe.dropper

http://iseler.net/allmyguests041/BQ/

exe.dropper

http://locuspura.com/cgi-bin/P/

exe.dropper

http://posmarkt.com/zebra/d/

exe.dropper

http://lyndas-orlando-villa.com/Images/N/

exe.dropper

http://ing-buero-naujok.de/cgi-bin/kVA/

Targets

    • Target

      81ca0187f2279178066a25dde3fb8cce_JaffaCakes118

    • Size

      197KB

    • MD5

      81ca0187f2279178066a25dde3fb8cce

    • SHA1

      f1e75b61556b0f1958d0aa4a7641d8d446718af0

    • SHA256

      b925b0d7be73ff4798ccc9d0da0510ae54f289bbb3fbbb62b410cd8253969d09

    • SHA512

      235f697f80cd5dc542e883b3ff29b0733462b8b6904167bcf3cb3220655afc03672f8e97adbf27c17dc36bb7fd7f34d3a41cb49a3c31c68fdea0f8f392f6888b

    • SSDEEP

      3072:H4PrXcuQuvpzm4bkiaMQgAlSVBgJEsGKh71fwt6:YDRv1m4bnQgISVGJEKhhfwt6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks