General

  • Target

    390f877688273a8c2cc420cb48a97cb1_JaffaCakes118

  • Size

    105KB

  • Sample

    240711-pcwcvsyanh

  • MD5

    390f877688273a8c2cc420cb48a97cb1

  • SHA1

    054958d50815805d677097275d994d46039037a3

  • SHA256

    60daac95bcce2b3021bb614a8fff918ac978e2f86e11ccaf9e8e50a1273f8d72

  • SHA512

    53590c18b845627a460887fca4869d6e9566312d6aa73de7543defc6d2fc30198e15e759e4bdf73c8ead2120657eca2be9faf9dcad57367a011384096435807d

  • SSDEEP

    3072:WcPiTQAVW/89BQnmlcGvgZ6Gr3J8YUOMqt/BI/s/C/i/R/7/3/UQ/OhP/2/a/1/A:WcPiTQAVW/89BQnmlcGvgZ7r3J8YUOMG

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://wordpress.nightingale.com/overview_user_2/nrjxvwss/4818840.dat

xlm40.dropper

http://www.anticasting.in/admin/lib/font-awesome/css/csjzie/4818840.dat

xlm40.dropper

http://www.laurietalbothall.com/wp-includes/SimplePie/Cache/nxkuckvdc/4818840.dat

xlm40.dropper

http://balmoraldevelopment.ca/zulrah-inventory-njbqt/cjeehroals/4818840.dat

xlm40.dropper

http://www.sinsenos3.info/wp-content/themes/Newsmag/nhhyypc/4818840.dat

Targets

    • Target

      390f877688273a8c2cc420cb48a97cb1_JaffaCakes118

    • Size

      105KB

    • MD5

      390f877688273a8c2cc420cb48a97cb1

    • SHA1

      054958d50815805d677097275d994d46039037a3

    • SHA256

      60daac95bcce2b3021bb614a8fff918ac978e2f86e11ccaf9e8e50a1273f8d72

    • SHA512

      53590c18b845627a460887fca4869d6e9566312d6aa73de7543defc6d2fc30198e15e759e4bdf73c8ead2120657eca2be9faf9dcad57367a011384096435807d

    • SSDEEP

      3072:WcPiTQAVW/89BQnmlcGvgZ6Gr3J8YUOMqt/BI/s/C/i/R/7/3/UQ/OhP/2/a/1/A:WcPiTQAVW/89BQnmlcGvgZ7r3J8YUOMG

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks