General

  • Target

    a5d076e196edd1e2271ff2bc178cc6c0_JaffaCakes118

  • Size

    96KB

  • Sample

    240613-qvrm3avfjj

  • MD5

    a5d076e196edd1e2271ff2bc178cc6c0

  • SHA1

    e2b3a98bb2844865890bf7133621acc11c485c33

  • SHA256

    c938e12aa898228c05c7f6257ebea9c6b22b9d842573043edef70cc5e2ef21ac

  • SHA512

    5b0dd7d0db62956323717d4f345a0e3400fddf5043af816073d83a77fe68a40041b3a78530e28233c586ed17594f805431c2bd062a1c779d3e6d91251ed78529

  • SSDEEP

    1536:VDMeOY5C6OJsdBpZWa+a9KQJJIJOO3qBYxyQiVz9wRQWR:V4eOY5CTsdAqIgUqyxyQiVRwGWR

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://sandraadamson.com/wp-admin/eb4hsq5634/

exe.dropper

http://qureshijewellery.com/css/ly399/

exe.dropper

http://acbay.com/uploaded/i63tw3769/

exe.dropper

http://steponmephoto.com/thewahligfour/x64157/

exe.dropper

http://sociallysavvyseo.com/PinnacleDynamicServices/of18k67/

Targets

    • Target

      a5d076e196edd1e2271ff2bc178cc6c0_JaffaCakes118

    • Size

      96KB

    • MD5

      a5d076e196edd1e2271ff2bc178cc6c0

    • SHA1

      e2b3a98bb2844865890bf7133621acc11c485c33

    • SHA256

      c938e12aa898228c05c7f6257ebea9c6b22b9d842573043edef70cc5e2ef21ac

    • SHA512

      5b0dd7d0db62956323717d4f345a0e3400fddf5043af816073d83a77fe68a40041b3a78530e28233c586ed17594f805431c2bd062a1c779d3e6d91251ed78529

    • SSDEEP

      1536:VDMeOY5C6OJsdBpZWa+a9KQJJIJOO3qBYxyQiVz9wRQWR:V4eOY5CTsdAqIgUqyxyQiVRwGWR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks