General

  • Target

    86210e53ed1942ad6dac5bb9c0844290_JaffaCakes118

  • Size

    476KB

  • Sample

    240810-p491bsvane

  • MD5

    86210e53ed1942ad6dac5bb9c0844290

  • SHA1

    b93bed2e799817d49eeeb2cb09099f0c17b233a4

  • SHA256

    24346ebead2ec6ea37b27c0939902b570698a2455170ba7ca2d0e9f3c9dac785

  • SHA512

    5e5febc24e9d49ab7c9bf12e0f8dfbb2c8212ec9a6ddc57fc9652cad1dd25eb40558c7fc90c4b5983e4ee996542aa348a4914bcea74feee064f6719e99fb33cc

  • SSDEEP

    6144:u5ES9BYFDVp5ES9BYFDWH5ES9BYFDrA5ES9BYFDcc5ES9BYFDZA5ES9V:LmBmQm6mFmkmV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://lokipanelhostingpanel.gq/work/worknew/16.exe

Targets

    • Target

      86210e53ed1942ad6dac5bb9c0844290_JaffaCakes118

    • Size

      476KB

    • MD5

      86210e53ed1942ad6dac5bb9c0844290

    • SHA1

      b93bed2e799817d49eeeb2cb09099f0c17b233a4

    • SHA256

      24346ebead2ec6ea37b27c0939902b570698a2455170ba7ca2d0e9f3c9dac785

    • SHA512

      5e5febc24e9d49ab7c9bf12e0f8dfbb2c8212ec9a6ddc57fc9652cad1dd25eb40558c7fc90c4b5983e4ee996542aa348a4914bcea74feee064f6719e99fb33cc

    • SSDEEP

      6144:u5ES9BYFDVp5ES9BYFDWH5ES9BYFDrA5ES9BYFDcc5ES9BYFDZA5ES9V:LmBmQm6mFmkmV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks