General

  • Target

    a60f37c9af7a78152e7572c72d25a905_JaffaCakes118

  • Size

    199KB

  • Sample

    240613-ry8w7axclk

  • MD5

    a60f37c9af7a78152e7572c72d25a905

  • SHA1

    9754f7e483db7d489aa9dd3d37c0b7dea7400193

  • SHA256

    f12b0ab6cd7e38f13cb0faadfb87bb09e736d67bd2004bd85604ba8327c1c73c

  • SHA512

    4266c0efbc3f53b285a17d383b14740458fd4b8d4db6c19acdc10f7e6e90b8216f115f352ac1ffa03ffea79cda8b9fc756445c70a7f0afa44e00f1758bf69883

  • SSDEEP

    1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj1Y:xrfrzOH98ipgnEDvxBYpe

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://houtai.xiaopbk.com/install/t0H/

exe.dropper

https://gudangalami.com/ivo6rp/UaBj2/

exe.dropper

https://webhostingsrilanka.info/pkrgs/ODn/

exe.dropper

http://luzzeri.com/wp-includes/T1mrkC/

exe.dropper

http://mobithem.com/blogs/Z3/

exe.dropper

http://planosdesaudesemcarencia.com/erros/E8iv/

exe.dropper

http://lookuppopup.co.uk/content/uploads/XNEm9/

Targets

    • Target

      a60f37c9af7a78152e7572c72d25a905_JaffaCakes118

    • Size

      199KB

    • MD5

      a60f37c9af7a78152e7572c72d25a905

    • SHA1

      9754f7e483db7d489aa9dd3d37c0b7dea7400193

    • SHA256

      f12b0ab6cd7e38f13cb0faadfb87bb09e736d67bd2004bd85604ba8327c1c73c

    • SHA512

      4266c0efbc3f53b285a17d383b14740458fd4b8d4db6c19acdc10f7e6e90b8216f115f352ac1ffa03ffea79cda8b9fc756445c70a7f0afa44e00f1758bf69883

    • SSDEEP

      1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj1Y:xrfrzOH98ipgnEDvxBYpe

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks