General

  • Target

    a12570ccf7f93f689e6df2961c438b34_JaffaCakes118

  • Size

    227KB

  • Sample

    240817-epxfkszbkr

  • MD5

    a12570ccf7f93f689e6df2961c438b34

  • SHA1

    b75305c7e38d465d5288d678e0b710628fc67495

  • SHA256

    bd6df621d3fc21030e92e7668b7ed7d038ec043653dd65b4178a622131c27327

  • SHA512

    1906607d3b1a9bdc3a72f53cd74996038f688a6c05befe9618d50be7f251f0e417bcbab233822bdc70d1c15fc023de41ebbe0d56186697155a9daaf30c9badb8

  • SSDEEP

    3072:nj6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkdgrUqf6ewvwsBQ:nHgtEWPsL/aTyT9GkdgrUqf6rwsS

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://enco-software.com/blogs/mtvqyqwl85094171/

exe.dropper

http://amcoitsystems.com/wp/ZxXBfZxSe/

exe.dropper

http://duchanhmechanical.com/images/zlFAsqZh/

exe.dropper

http://pixelactinc.com/pixel/YOOe/

exe.dropper

http://tf.sxhpyy120.com/a/bdSRd/

Targets

    • Target

      a12570ccf7f93f689e6df2961c438b34_JaffaCakes118

    • Size

      227KB

    • MD5

      a12570ccf7f93f689e6df2961c438b34

    • SHA1

      b75305c7e38d465d5288d678e0b710628fc67495

    • SHA256

      bd6df621d3fc21030e92e7668b7ed7d038ec043653dd65b4178a622131c27327

    • SHA512

      1906607d3b1a9bdc3a72f53cd74996038f688a6c05befe9618d50be7f251f0e417bcbab233822bdc70d1c15fc023de41ebbe0d56186697155a9daaf30c9badb8

    • SSDEEP

      3072:nj6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkdgrUqf6ewvwsBQ:nHgtEWPsL/aTyT9GkdgrUqf6rwsS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks