General

  • Target

    948f591ca0825a6298b648bf4eccbefb_JaffaCakes118

  • Size

    201KB

  • Sample

    240813-yx9wesyckm

  • MD5

    948f591ca0825a6298b648bf4eccbefb

  • SHA1

    f8001b5d311b0d6de41bcdccac9821439ea5f45a

  • SHA256

    912e6b82fee5f9b6770150fa456e40051bfae0d70f696e3cde2b0c82e9a1f891

  • SHA512

    190d3ee08289c36094f3c319e84b95b4d831a0364990b0254e12521deb42005f9a6885a2bc785b27fe79695d38f90ab1fea1d9fe75bbfe5d5a3d6c47e7877778

  • SSDEEP

    3072:dUqJ1NgsA8k/gvh0NZ0lGX1nZ7ZhpSgKsiEHE+b64Js:dBtgVIveNZvnvzKjEkc6cs

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://bavhome.com/wp-content/td/

exe.dropper

http://hercinovic.com/cgi-bin/mZt/

exe.dropper

https://jeffdahlke.com/css/3u/

exe.dropper

http://calledtochange.org/CalledtoChange/V/

exe.dropper

http://daoisthealing.com/cgi-bin/c/

exe.dropper

https://scyzm.net/wp-content/j/

exe.dropper

http://www.bismarjeparamebel.com/u/pCp/

Targets

    • Target

      948f591ca0825a6298b648bf4eccbefb_JaffaCakes118

    • Size

      201KB

    • MD5

      948f591ca0825a6298b648bf4eccbefb

    • SHA1

      f8001b5d311b0d6de41bcdccac9821439ea5f45a

    • SHA256

      912e6b82fee5f9b6770150fa456e40051bfae0d70f696e3cde2b0c82e9a1f891

    • SHA512

      190d3ee08289c36094f3c319e84b95b4d831a0364990b0254e12521deb42005f9a6885a2bc785b27fe79695d38f90ab1fea1d9fe75bbfe5d5a3d6c47e7877778

    • SSDEEP

      3072:dUqJ1NgsA8k/gvh0NZ0lGX1nZ7ZhpSgKsiEHE+b64Js:dBtgVIveNZvnvzKjEkc6cs

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks