General

  • Target

    821250bf34099b07ba82635ca9091e00_JaffaCakes118

  • Size

    142KB

  • Sample

    240801-2zmqfs1ejl

  • MD5

    821250bf34099b07ba82635ca9091e00

  • SHA1

    3aa7394e696cde485a859ea44d9ea50dc72cdfb1

  • SHA256

    e2f0ddc987ff0a9a79c926af6fdf767ec0c2c46220b5fc370d27a511567f0151

  • SHA512

    0339f37445b8e7d2e26d1e4311b9a1d93796aa0b1b75cfd8b2f5aba8f6e067025b4ee2b2a2ca0af5bf1e5d6c779f6ac14d0c4b6b8693041aab396dbc0808713a

  • SSDEEP

    1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqbMxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3Mgxm+Y0nae4sMKT6j

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ibccglobal.com/thankyou2/ARA/

exe.dropper

http://work.digitalvichar.com/1mv7clu/o/

exe.dropper

http://13.229.25.57/7xdfb/jpA/

exe.dropper

http://binarystationary.com/cgi-bin/5rM/

exe.dropper

http://fmcav.com/images/ZQF/

exe.dropper

https://kodiakheating.com/ldnha/ybI/

exe.dropper

https://khvs.vrfantasy.gallery/igiodbck/eXq/

Targets

    • Target

      821250bf34099b07ba82635ca9091e00_JaffaCakes118

    • Size

      142KB

    • MD5

      821250bf34099b07ba82635ca9091e00

    • SHA1

      3aa7394e696cde485a859ea44d9ea50dc72cdfb1

    • SHA256

      e2f0ddc987ff0a9a79c926af6fdf767ec0c2c46220b5fc370d27a511567f0151

    • SHA512

      0339f37445b8e7d2e26d1e4311b9a1d93796aa0b1b75cfd8b2f5aba8f6e067025b4ee2b2a2ca0af5bf1e5d6c779f6ac14d0c4b6b8693041aab396dbc0808713a

    • SSDEEP

      1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqbMxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3Mgxm+Y0nae4sMKT6j

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks