General

  • Target

    a4c8ad92bcad8e5bab528b1cad27ed48_JaffaCakes118

  • Size

    152KB

  • Sample

    240818-bbkcbawgre

  • MD5

    a4c8ad92bcad8e5bab528b1cad27ed48

  • SHA1

    7b144215063bd06ee66bd25c2f768d2e190016d5

  • SHA256

    06ae9d7036f2eab98389d37f9c78727563820bc3e43f8dfdb2493e93c4a4a743

  • SHA512

    91401f07d910b33f3fae8799c5dae66db300e912c12708e9a8f893af99ffd3face552d50e1106045eda30452a97e556b80934f500d7224f41b3ab68ac1d4c9ad

  • SSDEEP

    1536:8H1DB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9piYFHC3qoXj:O22TWTogk079THcpOu5UZLVdCVtBQXy

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://priyamcollection.com/cab/f/

exe.dropper

http://querofornecedores.com/wp-includes/images/D/

exe.dropper

https://hulianwang114.com/attachment/c/

exe.dropper

http://ixirhost.xyz/wp-content/z/

exe.dropper

https://weneedyourhelpnow.org/wp-content/LJ/

exe.dropper

https://averyair.com/wp-content/J/

exe.dropper

https://drippglobal.com/wp-content/rV/

Targets

    • Target

      a4c8ad92bcad8e5bab528b1cad27ed48_JaffaCakes118

    • Size

      152KB

    • MD5

      a4c8ad92bcad8e5bab528b1cad27ed48

    • SHA1

      7b144215063bd06ee66bd25c2f768d2e190016d5

    • SHA256

      06ae9d7036f2eab98389d37f9c78727563820bc3e43f8dfdb2493e93c4a4a743

    • SHA512

      91401f07d910b33f3fae8799c5dae66db300e912c12708e9a8f893af99ffd3face552d50e1106045eda30452a97e556b80934f500d7224f41b3ab68ac1d4c9ad

    • SSDEEP

      1536:8H1DB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9piYFHC3qoXj:O22TWTogk079THcpOu5UZLVdCVtBQXy

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks