General

  • Target

    86d4e207034a6208da149e4e320c97d1_JaffaCakes118

  • Size

    179KB

  • Sample

    240531-njm5dsgc49

  • MD5

    86d4e207034a6208da149e4e320c97d1

  • SHA1

    0109835d5262624bbb62e663cc8de46576cb414a

  • SHA256

    d07d0ed674ad854117b8fccbeeb561da2f41ed5e55d708ef7818ed882fdeb1eb

  • SHA512

    32bab5880c665b438b6083c3f0bc9b391b4dd4f8155950394b87a12a24abf11900cff8c7631a04521b3e8aaa2eda6d75d83446fdfe03554a9ee68f7a7d19c353

  • SSDEEP

    1536:uasrbYasrb2rdi1Ir77zOH98Wj2gpng9+a9OSGIRK9b/WYjd2LO6h/QC27Tfvo:crfrzOH98ipgmSGYK9TngLOm27Tfvo

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://sasystemsuk.com/index_files/j9b/

exe.dropper

https://case.gonukkad.com/sys-cache/fmC/

exe.dropper

http://vandamebuilders.com/wp-includes/OEyjc9x/

exe.dropper

https://nilinkeji.com/online/Dmz/

exe.dropper

http://paganwitch.com/wp-admin/CmubpSk/

exe.dropper

http://www.ekramco.ir/english/fn/

exe.dropper

http://votesteve.us/closed_zone/Bk/

Targets

    • Target

      86d4e207034a6208da149e4e320c97d1_JaffaCakes118

    • Size

      179KB

    • MD5

      86d4e207034a6208da149e4e320c97d1

    • SHA1

      0109835d5262624bbb62e663cc8de46576cb414a

    • SHA256

      d07d0ed674ad854117b8fccbeeb561da2f41ed5e55d708ef7818ed882fdeb1eb

    • SHA512

      32bab5880c665b438b6083c3f0bc9b391b4dd4f8155950394b87a12a24abf11900cff8c7631a04521b3e8aaa2eda6d75d83446fdfe03554a9ee68f7a7d19c353

    • SSDEEP

      1536:uasrbYasrb2rdi1Ir77zOH98Wj2gpng9+a9OSGIRK9b/WYjd2LO6h/QC27Tfvo:crfrzOH98ipgmSGYK9TngLOm27Tfvo

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks