General

  • Target

    8b235d81b66d5d48a940f01aa22e3d37_JaffaCakes118

  • Size

    86KB

  • Sample

    240601-vk31kahc4z

  • MD5

    8b235d81b66d5d48a940f01aa22e3d37

  • SHA1

    228ebb0f32716182195cf379f5aeb44eb402de66

  • SHA256

    0cb971758dd450c3b169411364f8fb0ca91be6670adcff0caf0ce40c2662e459

  • SHA512

    015f3b94aabf36de686f564341c19542810a25385b3727bbb1e47d8e384e9b55028bdfc3f53d2929543bb5fdd9f9053e8eb978c227566470f08e6fc92901d0af

  • SSDEEP

    1536:hqwHHEPGQDpFHV7y0yB2jwFhywG5FdMtYoPf5opXpVN2j:HnE+QDpFBhe2jwFhpPf5KzN2j

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://andymain.co.uk/jS/

exe.dropper

http://fullanimals.cl/LWSB/

exe.dropper

http://delia.com.br/uvxNs/

exe.dropper

http://digbyjones.com/z/

exe.dropper

http://tech4bargain.com/mj/

Targets

    • Target

      8b235d81b66d5d48a940f01aa22e3d37_JaffaCakes118

    • Size

      86KB

    • MD5

      8b235d81b66d5d48a940f01aa22e3d37

    • SHA1

      228ebb0f32716182195cf379f5aeb44eb402de66

    • SHA256

      0cb971758dd450c3b169411364f8fb0ca91be6670adcff0caf0ce40c2662e459

    • SHA512

      015f3b94aabf36de686f564341c19542810a25385b3727bbb1e47d8e384e9b55028bdfc3f53d2929543bb5fdd9f9053e8eb978c227566470f08e6fc92901d0af

    • SSDEEP

      1536:hqwHHEPGQDpFHV7y0yB2jwFhywG5FdMtYoPf5opXpVN2j:HnE+QDpFBhe2jwFhpPf5KzN2j

    Score
    10/10
    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks