General

  • Target

    9cd5b312fe77e3884521aaa3bcc57030_JaffaCakes118

  • Size

    172KB

  • Sample

    240611-dwnlksshpl

  • MD5

    9cd5b312fe77e3884521aaa3bcc57030

  • SHA1

    cf09e7ddfe7ea83aafa5a7c91d0be6aadcda7f9d

  • SHA256

    9c2e5cace48f8be6f1097cafd2ed1709567e06874bd0ec10a17bfb6cb2d49bcc

  • SHA512

    381c15d89fc83b357b4eaa83c5fb8cdcf6d02f99c4abefe56941a6f768b9958e870d672890af3d829423535f5a374df6f9046ce5b49e331bebe245e3df5edec9

  • SSDEEP

    1536:LGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xiP2hCYey7dL6PhLtHrxM43atHtjB:ZrfrzOH98ipglHD+3KvoEwxQ

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://smartfarmsky.com/kdxhp/K/

exe.dropper

https://theonesmartpiano.com/wp-admin/css/colors/modern/W/

exe.dropper

https://www.breedenandsilver.com/wp-content/W3/

exe.dropper

https://blog.workshots.net/bibqcr9/GSB/

exe.dropper

https://lggpm.live/cgi-bin/Yq/

exe.dropper

https://sodalite.life/wp-content/uploads/Fl/

exe.dropper

https://classroom.live/wp-content/OlY/

Targets

    • Target

      9cd5b312fe77e3884521aaa3bcc57030_JaffaCakes118

    • Size

      172KB

    • MD5

      9cd5b312fe77e3884521aaa3bcc57030

    • SHA1

      cf09e7ddfe7ea83aafa5a7c91d0be6aadcda7f9d

    • SHA256

      9c2e5cace48f8be6f1097cafd2ed1709567e06874bd0ec10a17bfb6cb2d49bcc

    • SHA512

      381c15d89fc83b357b4eaa83c5fb8cdcf6d02f99c4abefe56941a6f768b9958e870d672890af3d829423535f5a374df6f9046ce5b49e331bebe245e3df5edec9

    • SSDEEP

      1536:LGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xiP2hCYey7dL6PhLtHrxM43atHtjB:ZrfrzOH98ipglHD+3KvoEwxQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks