General

  • Target

    b202392b8e7a6e42d4916f052de6fc02_JaffaCakes118

  • Size

    240KB

  • Sample

    240616-gl99dawdjr

  • MD5

    b202392b8e7a6e42d4916f052de6fc02

  • SHA1

    854ece5881df3412df15289079c98cf299f3e43c

  • SHA256

    9c72d2a9e0873be2788bcf5dbffb5c7bb89208263b407066962c2c8b874e8f26

  • SHA512

    c4afa0de14add1a2f780d5f491f81c6b3e85d12ee81e12e5cf6780a13505808624bae5ccf350f5631cfec08012ca6f1077f01ff7b91ef8b98f207fd08d24526e

  • SSDEEP

    6144:6v/ybBPDDMkqWqs6vOtX0OEDzYUTE7yZRVUi8E:4/GJsOtX0BzEmZRGi7

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://fleetstreetstudios.co.za/LcX6_wx2gkPUh

exe.dropper

http://pentick.space/8EVxz_Uvsd_4

exe.dropper

http://www.ipbempreende.com.br/d2gp7Tj_xfPR2

exe.dropper

http://plottermais.com/geYz_l5Du

exe.dropper

http://aplusglass-parebrise-anet.fr/T4V4_LvALup08_FOXAtN

Targets

    • Target

      b202392b8e7a6e42d4916f052de6fc02_JaffaCakes118

    • Size

      240KB

    • MD5

      b202392b8e7a6e42d4916f052de6fc02

    • SHA1

      854ece5881df3412df15289079c98cf299f3e43c

    • SHA256

      9c72d2a9e0873be2788bcf5dbffb5c7bb89208263b407066962c2c8b874e8f26

    • SHA512

      c4afa0de14add1a2f780d5f491f81c6b3e85d12ee81e12e5cf6780a13505808624bae5ccf350f5631cfec08012ca6f1077f01ff7b91ef8b98f207fd08d24526e

    • SSDEEP

      6144:6v/ybBPDDMkqWqs6vOtX0OEDzYUTE7yZRVUi8E:4/GJsOtX0BzEmZRGi7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks