General

  • Target

    b362a32aec816caf5fe07eb4b1de9be0_JaffaCakes118

  • Size

    243KB

  • Sample

    240616-n4vpzascpe

  • MD5

    b362a32aec816caf5fe07eb4b1de9be0

  • SHA1

    fea765fc84fec6bd07f61b81305cdff0dbbe08f7

  • SHA256

    0b682badc7ff5224c955f8f117246513eaff6f331e94cc39d8278818508f4b69

  • SHA512

    aaab7b6c4c4c822d5425a3a6195d9470879771441327828a1b539da057b8d0dbffe1bf34c52c77b0c4935515099782fc7d7aad4dbf7225c98c87dccf777b09de

  • SSDEEP

    3072:lj6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGk++BsyFu+PxwKv/M:lHgtEWPsL/aTyT9Gk9qyNPxwKs

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://thuening.de/cgi-bin/uo9wm/

exe.dropper

http://portugalmypassion.com/wp-content/gJWA/

exe.dropper

http://colegiolaesperanza.cl/new_img/fuJUk/

exe.dropper

http://neuromedicaltechnology.com/cgi-bin/SkB/

exe.dropper

http://sensesgo.com/e9x8b82yg/y651K/

exe.dropper

http://theonpassive.com/wp-admin/A3/

exe.dropper

http://www.feetinform.de/localization/n7g/

Targets

    • Target

      b362a32aec816caf5fe07eb4b1de9be0_JaffaCakes118

    • Size

      243KB

    • MD5

      b362a32aec816caf5fe07eb4b1de9be0

    • SHA1

      fea765fc84fec6bd07f61b81305cdff0dbbe08f7

    • SHA256

      0b682badc7ff5224c955f8f117246513eaff6f331e94cc39d8278818508f4b69

    • SHA512

      aaab7b6c4c4c822d5425a3a6195d9470879771441327828a1b539da057b8d0dbffe1bf34c52c77b0c4935515099782fc7d7aad4dbf7225c98c87dccf777b09de

    • SSDEEP

      3072:lj6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGk++BsyFu+PxwKv/M:lHgtEWPsL/aTyT9Gk9qyNPxwKs

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks