General

  • Target

    a334eda3f5213ada0315be04e5a6b820_JaffaCakes118

  • Size

    58KB

  • Sample

    240613-a3mq3s1epp

  • MD5

    a334eda3f5213ada0315be04e5a6b820

  • SHA1

    681e61200520d760c8b8e3d19228c858f272051b

  • SHA256

    d75925f40f75c94ba4969ebb3168fbaa7aa9475d438dfadc7f515257e551f327

  • SHA512

    4090e5c6df9efcc38da3e3ce14ac884450c71ea8323b13945d92906fb48eb51084f3dfb3f669adcdf81688b9b13f74880a22f554556a7662f768035134f7c466

  • SSDEEP

    1536:jG6FxT6lmheHp79A3Hq00vv1k3mHzdA9mMiTswvE2bGD0e1:jG6z+HfEHqdv1k3GpsHAswvE2qb

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://smartfarmsky.com/kdxhp/K/

exe.dropper

https://theonesmartpiano.com/wp-admin/css/colors/modern/W/

exe.dropper

https://www.breedenandsilver.com/wp-content/W3/

exe.dropper

https://blog.workshots.net/bibqcr9/GSB/

exe.dropper

https://lggpm.live/cgi-bin/Yq/

exe.dropper

https://sodalite.life/wp-content/uploads/Fl/

exe.dropper

https://classroom.live/wp-content/OlY/

Targets

    • Target

      sample

    • Size

      171KB

    • MD5

      6d059ee23fecc237fd506ade5186e477

    • SHA1

      e6b290d6d2c31541013081d6a8f1f873b59cb163

    • SHA256

      309a7c90bf99fbe1b4d1efc8dfc82b8d0b0fdeacdddbb44061abf4ab98ff2320

    • SHA512

      8f83f2644d0c3d764b583d49567b97bdfeb645561d5130d347418f1d30e36747bc3e524f351121145d4f459752afb71d29d2b50c2e8829cea0b0c643de8977ac

    • SSDEEP

      1536:LGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xiP2hCYey7dL6PhLtHrxM43atHtjb:ZrfrzOH98ipg6HD+3KvoEwuQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks