General

  • Target

    8d59d77526bb6cced1726eac8fe31b27_JaffaCakes118

  • Size

    241KB

  • Sample

    240602-jmz6xafc5s

  • MD5

    8d59d77526bb6cced1726eac8fe31b27

  • SHA1

    40c446559c33cb7b6f8423fceb85d6a9287b530f

  • SHA256

    1228899af965485c56b01b3877f3e27a6c3419a7444a7e6c5d5cd0d0aa9bccf2

  • SHA512

    c6985abe1ab2346fbe4d1ac5236495288e160ae78b0b732d4a6cf5995c8ed7051d7eb44683f202c1050e27d3fbdd863dae6e6765ad6a14980e0b1d4775bfcf5e

  • SSDEEP

    3072:0j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkRRaZjBu7DvqwNs:0HgtEWPsL/aTyT9GkRRapCqwG

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://ukasian.com/wp-admin/Znk3yozl/

exe.dropper

http://techwala.net/wp-admin/tKX319361/

exe.dropper

http://schladzalniki.eko-bart.pl/cgi-bin/7f53903/

exe.dropper

https://mte1.cn/wp-includes/PkuVF1RiI/

exe.dropper

http://topkadry.com.ua/cgi-bin/dhH718397/

Targets

    • Target

      8d59d77526bb6cced1726eac8fe31b27_JaffaCakes118

    • Size

      241KB

    • MD5

      8d59d77526bb6cced1726eac8fe31b27

    • SHA1

      40c446559c33cb7b6f8423fceb85d6a9287b530f

    • SHA256

      1228899af965485c56b01b3877f3e27a6c3419a7444a7e6c5d5cd0d0aa9bccf2

    • SHA512

      c6985abe1ab2346fbe4d1ac5236495288e160ae78b0b732d4a6cf5995c8ed7051d7eb44683f202c1050e27d3fbdd863dae6e6765ad6a14980e0b1d4775bfcf5e

    • SSDEEP

      3072:0j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkRRaZjBu7DvqwNs:0HgtEWPsL/aTyT9GkRRapCqwG

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks