General

  • Target

    98693400936db61077908732f3bcc270_JaffaCakes118

  • Size

    100KB

  • Sample

    240605-rxkszaaf77

  • MD5

    98693400936db61077908732f3bcc270

  • SHA1

    f76d912e00c28d19fb8951763639e016d8098f47

  • SHA256

    406a7b366b4e11acbba9480e4847ac5487f2ab8b597a0d7653d5c7cb37f30e0b

  • SHA512

    26bd56f2f008ef24b4271abee65a2ee0386cc4f031f60ea37079d08c304c27ddb83a62d17e17dbf8ab888159c5ff46a9ba2f4b964c6fc007e90c045b8034c7b2

  • SSDEEP

    1536:1dCDGDK9ruMSORc/R9Yn+agEbI/ui0Hvoc1p42K+cXlyn:bDYvSOq/Tpui0HvhPYXQ

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://maisbrasilphoto.com.br/yWEiMr/

exe.dropper

http://dievoigts.com/u0rQ/

exe.dropper

http://gh-zone.net/SUnkf38/

exe.dropper

http://marek.in/saS96A/

Targets

    • Target

      98693400936db61077908732f3bcc270_JaffaCakes118

    • Size

      100KB

    • MD5

      98693400936db61077908732f3bcc270

    • SHA1

      f76d912e00c28d19fb8951763639e016d8098f47

    • SHA256

      406a7b366b4e11acbba9480e4847ac5487f2ab8b597a0d7653d5c7cb37f30e0b

    • SHA512

      26bd56f2f008ef24b4271abee65a2ee0386cc4f031f60ea37079d08c304c27ddb83a62d17e17dbf8ab888159c5ff46a9ba2f4b964c6fc007e90c045b8034c7b2

    • SSDEEP

      1536:1dCDGDK9ruMSORc/R9Yn+agEbI/ui0Hvoc1p42K+cXlyn:bDYvSOq/Tpui0HvhPYXQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks