General

  • Target

    adf35549a252723b8e392ef1643134d8_JaffaCakes118

  • Size

    248KB

  • Sample

    240615-maxf2azgrk

  • MD5

    adf35549a252723b8e392ef1643134d8

  • SHA1

    0ecafc6cf721543057b7206c0816c106c919e961

  • SHA256

    8306ac8c8238290885ea335365248c0ca13f5119a7eec7b030721b1a62a33f3a

  • SHA512

    014f4bf78b0f4452580c83120267edf1a09006892a0357923aee7a83ebfa416ac233203c8889aed8ebd36a9b02b41707a3e706d5aca8124d5ce269b071ff2ec7

  • SSDEEP

    3072:d39LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDOwqQ+cxbkRqMGOG:FuH2aCGw1ST1wrL5qv

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/pavelenko/Media/master/MediaMonkey_4.1.21.1873.exe

Targets

    • Target

      adf35549a252723b8e392ef1643134d8_JaffaCakes118

    • Size

      248KB

    • MD5

      adf35549a252723b8e392ef1643134d8

    • SHA1

      0ecafc6cf721543057b7206c0816c106c919e961

    • SHA256

      8306ac8c8238290885ea335365248c0ca13f5119a7eec7b030721b1a62a33f3a

    • SHA512

      014f4bf78b0f4452580c83120267edf1a09006892a0357923aee7a83ebfa416ac233203c8889aed8ebd36a9b02b41707a3e706d5aca8124d5ce269b071ff2ec7

    • SSDEEP

      3072:d39LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDOwqQ+cxbkRqMGOG:FuH2aCGw1ST1wrL5qv

    Score
    10/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks