General

  • Target

    b2750ba41bda0e159d116bdd0e9f39ef_JaffaCakes118

  • Size

    131KB

  • Sample

    240616-jsvtdavhpf

  • MD5

    b2750ba41bda0e159d116bdd0e9f39ef

  • SHA1

    cd5175420a514c8bf0cc0f8834e2ef052e6ba434

  • SHA256

    1f4fca46fee974ec0c313f93763cc9d94fc476f67716657e6e0608130dd199a1

  • SHA512

    a0aa15aa2ed48c737fc3f2f0018448636bf142fadb5f56221f1cf9d8a42554f8bf5723d3c597290761862951a6808ae1be2b56c343b72b3b270b7a6e4c8433e1

  • SSDEEP

    1536:NZ0rgMc0qg4Kkd8j6IjM+ahv0H/ovL+b4GJog6unhEXPx04IsC:Yrgzg4KkjoS2wvLuJyuMx0Ds

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mnapoli.org/iq2V1CQ/

exe.dropper

http://redfern.it/mfa6Sg3/

exe.dropper

http://hitech-control.com/KYGsjZ/

exe.dropper

http://podpea.co.uk/2DLIE6/

Targets

    • Target

      b2750ba41bda0e159d116bdd0e9f39ef_JaffaCakes118

    • Size

      131KB

    • MD5

      b2750ba41bda0e159d116bdd0e9f39ef

    • SHA1

      cd5175420a514c8bf0cc0f8834e2ef052e6ba434

    • SHA256

      1f4fca46fee974ec0c313f93763cc9d94fc476f67716657e6e0608130dd199a1

    • SHA512

      a0aa15aa2ed48c737fc3f2f0018448636bf142fadb5f56221f1cf9d8a42554f8bf5723d3c597290761862951a6808ae1be2b56c343b72b3b270b7a6e4c8433e1

    • SSDEEP

      1536:NZ0rgMc0qg4Kkd8j6IjM+ahv0H/ovL+b4GJog6unhEXPx04IsC:Yrgzg4KkjoS2wvLuJyuMx0Ds

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks