General

  • Target

    a16ebba85656e351edf546eef124e4dc_JaffaCakes118

  • Size

    158KB

  • Sample

    240612-vk9s4ssdpb

  • MD5

    a16ebba85656e351edf546eef124e4dc

  • SHA1

    11ab73b26e41670c3fe8e7be67ac6b51db1f6541

  • SHA256

    3ee56397fcfde3641f7f9115a3226d0bc7fbb7179c1743815a22700cc0ca30bf

  • SHA512

    b03744cd592434f454dd238facb6045c7093f196fe06fe5daf1f6c77d814f3c10d8d282b79e00c068d00afc1d06df705c39d5c4434ab437648eb0e1b534c381a

  • SSDEEP

    1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a9OlJiW9:1rfrzOH98ipgMYW9

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://case.gonukkad.com/sys-cache/CjT/

exe.dropper

https://starrcoin.net/wp-admin/YT/

exe.dropper

http://modelaw.devkind.com.au/wp-admin/cvDRmGK/

exe.dropper

http://dprkp.palembang.go.id/sys-cache/7Y4aHw/

exe.dropper

http://completeguideblogging.com/euiot/PAuJG/

exe.dropper

http://qutiche.cn/wp-admin/Q/

exe.dropper

https://shiva-engineering.com/1cj/tKemHV7/

Targets

    • Target

      a16ebba85656e351edf546eef124e4dc_JaffaCakes118

    • Size

      158KB

    • MD5

      a16ebba85656e351edf546eef124e4dc

    • SHA1

      11ab73b26e41670c3fe8e7be67ac6b51db1f6541

    • SHA256

      3ee56397fcfde3641f7f9115a3226d0bc7fbb7179c1743815a22700cc0ca30bf

    • SHA512

      b03744cd592434f454dd238facb6045c7093f196fe06fe5daf1f6c77d814f3c10d8d282b79e00c068d00afc1d06df705c39d5c4434ab437648eb0e1b534c381a

    • SSDEEP

      1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a9OlJiW9:1rfrzOH98ipgMYW9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks