General

  • Target

    a242d9e30b12f152357ab099c5588bd3_JaffaCakes118

  • Size

    194KB

  • Sample

    240612-zf7keatarm

  • MD5

    a242d9e30b12f152357ab099c5588bd3

  • SHA1

    f65000d2dc280b8391642b6bf1dd9493303c604e

  • SHA256

    0e31dc003b5fa4ef58751e94f3718852fdf5c75f438a8a587eac213cc8786c23

  • SHA512

    7db1cb9312be1213a47b401476d8a5328b3acc86af21eff3bf5b04167fa27b1ba25a7dccac0a92fa680778f350410579985f13ce8aa24228059f84714836e7fc

  • SSDEEP

    1536:2rdi1Ir77zOH98Wj2gpngh+a9nIul8oPhEPmRl6VO64R:2rfrzOH98ipgLIul8uWP+l6VO64R

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://vstbar.com/wp-admin/Hs/

exe.dropper

http://binarywebtechsolutions.com/mobile-website-designing-company-in-gurgaon/CLZ/

exe.dropper

http://shahqutubuddin.org/U/

exe.dropper

http://cybersign-001-site5.gtempurl.com/2xwzq/bve/

exe.dropper

https://star-speed.vip/wp-admin/Ttv/

exe.dropper

https://treneg.com.br/rfvmbh/a/

exe.dropper

https://cimsjr.com/hospital/x2f/

Targets

    • Target

      a242d9e30b12f152357ab099c5588bd3_JaffaCakes118

    • Size

      194KB

    • MD5

      a242d9e30b12f152357ab099c5588bd3

    • SHA1

      f65000d2dc280b8391642b6bf1dd9493303c604e

    • SHA256

      0e31dc003b5fa4ef58751e94f3718852fdf5c75f438a8a587eac213cc8786c23

    • SHA512

      7db1cb9312be1213a47b401476d8a5328b3acc86af21eff3bf5b04167fa27b1ba25a7dccac0a92fa680778f350410579985f13ce8aa24228059f84714836e7fc

    • SSDEEP

      1536:2rdi1Ir77zOH98Wj2gpngh+a9nIul8oPhEPmRl6VO64R:2rfrzOH98ipgLIul8uWP+l6VO64R

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks