General

  • Target

    a3b81e2c7dacedaafde16a60ba397a52_JaffaCakes118

  • Size

    159KB

  • Sample

    240817-xhc3ga1cne

  • MD5

    a3b81e2c7dacedaafde16a60ba397a52

  • SHA1

    29a49b4be8528dbbb787658a1bf3d0b12673e230

  • SHA256

    a264844ab1f216ed35be45d33e87a627daf6c537e39717dd9f009940441da9d0

  • SHA512

    5265f8b80c1e4967a27740be22068c657484d78d22c6364b7b41ce808a31d280317471b2dffed97b208cb17e99f2e323a8a1ba2083ab234bbda5d7ba4a6196a6

  • SSDEEP

    1536:TB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5F+a9lPzlnb30Sx:T22TWTogk079THcpOu5UZnP5b30Sx

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://jobcapper.com/8.7.19/hrS/

exe.dropper

http://scoomie.com/wp-content/uploads/mxjsB/

exe.dropper

https://blog.workshots.net/bibqcr9/Eki/

exe.dropper

https://hxoptical.net/wp-admin/91C/

exe.dropper

https://adidasnmdfootlocker.com/nc_assets/F/

exe.dropper

http://socylmediapc.es/tools/D7Ogq/

exe.dropper

http://lombardzista.pl/wp-content/r/

Targets

    • Target

      a3b81e2c7dacedaafde16a60ba397a52_JaffaCakes118

    • Size

      159KB

    • MD5

      a3b81e2c7dacedaafde16a60ba397a52

    • SHA1

      29a49b4be8528dbbb787658a1bf3d0b12673e230

    • SHA256

      a264844ab1f216ed35be45d33e87a627daf6c537e39717dd9f009940441da9d0

    • SHA512

      5265f8b80c1e4967a27740be22068c657484d78d22c6364b7b41ce808a31d280317471b2dffed97b208cb17e99f2e323a8a1ba2083ab234bbda5d7ba4a6196a6

    • SSDEEP

      1536:TB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5F+a9lPzlnb30Sx:T22TWTogk079THcpOu5UZnP5b30Sx

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks