General

  • Target

    a788e80e8e6c307e23d52bfc0ee0773a_JaffaCakes118

  • Size

    157KB

  • Sample

    240614-bwacvazdkg

  • MD5

    a788e80e8e6c307e23d52bfc0ee0773a

  • SHA1

    74ab701c25070285a0c90b802641585f3a87121e

  • SHA256

    ec35c865bf8800c7c181f7d32eaf0ac18c1722706483e99f43e33fe16ff3ff8a

  • SHA512

    97ae4d93b97e674258d3c9ec3e009b7fc4f5d595de02fa9c61ed96e48c47b68d49e8980443bebfb8c05a2514084e005b65e34dace165cd17b05cc495e1a21c0c

  • SSDEEP

    3072:WFiV0zJjiN3ljS52R9yYZzSljw5KlAThn9t7Cry9ZwGylobUB5BEc:WW0zJ2N3RSLYZX5nnn+2U1

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://iselfcaremassager.com/tibudr/sotpie/xs/update.exe

Targets

    • Target

      a788e80e8e6c307e23d52bfc0ee0773a_JaffaCakes118

    • Size

      157KB

    • MD5

      a788e80e8e6c307e23d52bfc0ee0773a

    • SHA1

      74ab701c25070285a0c90b802641585f3a87121e

    • SHA256

      ec35c865bf8800c7c181f7d32eaf0ac18c1722706483e99f43e33fe16ff3ff8a

    • SHA512

      97ae4d93b97e674258d3c9ec3e009b7fc4f5d595de02fa9c61ed96e48c47b68d49e8980443bebfb8c05a2514084e005b65e34dace165cd17b05cc495e1a21c0c

    • SSDEEP

      3072:WFiV0zJjiN3ljS52R9yYZzSljw5KlAThn9t7Cry9ZwGylobUB5BEc:WW0zJ2N3RSLYZX5nnn+2U1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks