General

  • Target

    862a0a60886bc432c39c9438727be51d_JaffaCakes118

  • Size

    157KB

  • Sample

    240531-grk7fahd2z

  • MD5

    862a0a60886bc432c39c9438727be51d

  • SHA1

    c0a3979f1d1e423b6f9982c14ed861ff486093e0

  • SHA256

    933b3518041b978efa6f14e957c5a72dbd62b3e460129c2eb6904ba09c1b8f17

  • SHA512

    c6faad0e04ea1084d8ef0f5297b28f4685f284b15fdba08ee1a106f18467cf2d01af08fc83877f3a4cc721bcc7b21fb7c39046ffc3244e75b0c0a359e1081824

  • SSDEEP

    1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a9vlJiOP:1rfrzOH98ipgpYOP

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://case.gonukkad.com/sys-cache/CjT/

exe.dropper

https://starrcoin.net/wp-admin/YT/

exe.dropper

http://modelaw.devkind.com.au/wp-admin/cvDRmGK/

exe.dropper

http://dprkp.palembang.go.id/sys-cache/7Y4aHw/

exe.dropper

http://completeguideblogging.com/euiot/PAuJG/

exe.dropper

http://qutiche.cn/wp-admin/Q/

exe.dropper

https://shiva-engineering.com/1cj/tKemHV7/

Targets

    • Target

      862a0a60886bc432c39c9438727be51d_JaffaCakes118

    • Size

      157KB

    • MD5

      862a0a60886bc432c39c9438727be51d

    • SHA1

      c0a3979f1d1e423b6f9982c14ed861ff486093e0

    • SHA256

      933b3518041b978efa6f14e957c5a72dbd62b3e460129c2eb6904ba09c1b8f17

    • SHA512

      c6faad0e04ea1084d8ef0f5297b28f4685f284b15fdba08ee1a106f18467cf2d01af08fc83877f3a4cc721bcc7b21fb7c39046ffc3244e75b0c0a359e1081824

    • SSDEEP

      1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a9vlJiOP:1rfrzOH98ipgpYOP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks