General

  • Target

    9fc23ebcc8bc57b2cd90081eae761848_JaffaCakes118

  • Size

    212KB

  • Sample

    240611-2fr6tsvanm

  • MD5

    9fc23ebcc8bc57b2cd90081eae761848

  • SHA1

    68737159f3b240502c02fbc638439b2594a6e50a

  • SHA256

    2399ac63e3280313a12469e86cd594da3fdece95ec09663dd10823aeb1958130

  • SHA512

    3ee2e33988b0144c6bf5622e86c9a6b656af121122beabaf0186c8c126bcd28340f04ef3133f72705b2919433205cf77f424522d4b65ae58ff2e4b1669c7ae44

  • SSDEEP

    3072:u22TWTogk079THcpOu5UZI0/6tJR6RsfY:u/TX07hHcJQItT6RQY

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.1plus-agency.com/tmp/nlr08Z0/

exe.dropper

http://winadev.com/uglot/iiClU/

exe.dropper

https://enews.enkj.com/wordpress/h62/

exe.dropper

https://apicosto.misco-furniture.com/dvzmj/0xm3yS/

exe.dropper

http://drbeatrice.com/wp-content/HSz/

exe.dropper

https://ienerpro.com/cgi-bin/VVwhOR/

exe.dropper

https://premierbarsamui.com/Irc/O/

Targets

    • Target

      9fc23ebcc8bc57b2cd90081eae761848_JaffaCakes118

    • Size

      212KB

    • MD5

      9fc23ebcc8bc57b2cd90081eae761848

    • SHA1

      68737159f3b240502c02fbc638439b2594a6e50a

    • SHA256

      2399ac63e3280313a12469e86cd594da3fdece95ec09663dd10823aeb1958130

    • SHA512

      3ee2e33988b0144c6bf5622e86c9a6b656af121122beabaf0186c8c126bcd28340f04ef3133f72705b2919433205cf77f424522d4b65ae58ff2e4b1669c7ae44

    • SSDEEP

      3072:u22TWTogk079THcpOu5UZI0/6tJR6RsfY:u/TX07hHcJQItT6RQY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks