General

  • Target

    857bdc6add218de87c9e33858b5e252c_JaffaCakes118

  • Size

    187KB

  • Sample

    240531-a4m38sge31

  • MD5

    857bdc6add218de87c9e33858b5e252c

  • SHA1

    9adee5168ef6fbeaa204e43fbe3983294db8ad9f

  • SHA256

    433d222899298ae9186785becb3fee9efc501bb9f52469707c05211a27d20399

  • SHA512

    55ac00cb2ed42caa937e446d57428780bd0edd99f5cf11871f41cb3b18b0be546d6a0c3f79cbdd620bfc82328c0dd55c0494420c387066216b4f2d59c796fc3e

  • SSDEEP

    3072:wdvj2RIaKgUgQ5gJOav1R+cv8UZ7ypkgCppOHhKOQ9UOyAvC:+8IBL58QQr7yhCvOHhKOSUvD

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://basr.sunrisetheme.com/database/e8mI/

exe.dropper

http://bipcode.com.br/news/wR/

exe.dropper

http://bud-etc.com.ua/wp-admin/Ycc/

exe.dropper

http://bafa.com.ar/wp-content/qs/

exe.dropper

http://adeladesign.ro/wp-content/u0B/

Targets

    • Target

      857bdc6add218de87c9e33858b5e252c_JaffaCakes118

    • Size

      187KB

    • MD5

      857bdc6add218de87c9e33858b5e252c

    • SHA1

      9adee5168ef6fbeaa204e43fbe3983294db8ad9f

    • SHA256

      433d222899298ae9186785becb3fee9efc501bb9f52469707c05211a27d20399

    • SHA512

      55ac00cb2ed42caa937e446d57428780bd0edd99f5cf11871f41cb3b18b0be546d6a0c3f79cbdd620bfc82328c0dd55c0494420c387066216b4f2d59c796fc3e

    • SSDEEP

      3072:wdvj2RIaKgUgQ5gJOav1R+cv8UZ7ypkgCppOHhKOQ9UOyAvC:+8IBL58QQr7yhCvOHhKOSUvD

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks