General

  • Target

    b81fda53743bae3039a30ef518c3d71b_JaffaCakes118

  • Size

    221KB

  • Sample

    240617-mfr4ha1ajn

  • MD5

    b81fda53743bae3039a30ef518c3d71b

  • SHA1

    df9e5ef342bfb02ab8dfe6fbf5d638c5183d04bd

  • SHA256

    1de0cc359d911b8ea7f0d8e8e345d5d3b0565076570c85494e6e4ea147f271d3

  • SHA512

    328306a30ff9443fce7373eb9349f9652e0c5dce4652e00155e9c7eeedb1a82aceaea05617a6b6c4ddcd4defbcc6e2a5f0099e0b999f0a03c3041eb9b85bdf94

  • SSDEEP

    3072:b4tcTvjvTY140818tIP4ovpUSGju9jDW1M+7Mp3W:EtcnvE140o8tIP4apXjDjmSW

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hottco.com/stats/erd/

exe.dropper

http://dutarini.com/cgi-bin/6/

exe.dropper

https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/

exe.dropper

http://pastaciyiz.biz/wp-includes/fvx/

exe.dropper

https://dogaltrm.com/components/r6h/

exe.dropper

https://dortislem.net/administrator/c/

exe.dropper

https://onyourleftracing.com/cgi-bin/QcC/

Targets

    • Target

      b81fda53743bae3039a30ef518c3d71b_JaffaCakes118

    • Size

      221KB

    • MD5

      b81fda53743bae3039a30ef518c3d71b

    • SHA1

      df9e5ef342bfb02ab8dfe6fbf5d638c5183d04bd

    • SHA256

      1de0cc359d911b8ea7f0d8e8e345d5d3b0565076570c85494e6e4ea147f271d3

    • SHA512

      328306a30ff9443fce7373eb9349f9652e0c5dce4652e00155e9c7eeedb1a82aceaea05617a6b6c4ddcd4defbcc6e2a5f0099e0b999f0a03c3041eb9b85bdf94

    • SSDEEP

      3072:b4tcTvjvTY140818tIP4ovpUSGju9jDW1M+7Mp3W:EtcnvE140o8tIP4apXjDjmSW

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks