General

  • Target

    ad44ab8315d5076c5bd27e3712621aab_JaffaCakes118

  • Size

    143KB

  • Sample

    240820-a7j6raygnk

  • MD5

    ad44ab8315d5076c5bd27e3712621aab

  • SHA1

    973351a36591f641dc4a3b62b1ecbbad08b024da

  • SHA256

    dc939640b203aebb656969e5657972216e1c314c2a621e1767747f2e73cd5f19

  • SHA512

    93dbdcdb0ea2b29bba532535bf0451ce0f6214e1424103d175414ce706280d9413b92479eef1414622e1b0428076aaf4c8db58d9e62c78f1861ddc4deb506ffb

  • SSDEEP

    1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqXMxXOYgnJnIJe4SGOMKaK4/z:0R1qf69xak3Mgxm+Y0nae4sMKT6z

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ibccglobal.com/thankyou2/ARA/

exe.dropper

http://work.digitalvichar.com/1mv7clu/o/

exe.dropper

http://13.229.25.57/7xdfb/jpA/

exe.dropper

http://binarystationary.com/cgi-bin/5rM/

exe.dropper

http://fmcav.com/images/ZQF/

exe.dropper

https://kodiakheating.com/ldnha/ybI/

exe.dropper

https://khvs.vrfantasy.gallery/igiodbck/eXq/

Targets

    • Target

      ad44ab8315d5076c5bd27e3712621aab_JaffaCakes118

    • Size

      143KB

    • MD5

      ad44ab8315d5076c5bd27e3712621aab

    • SHA1

      973351a36591f641dc4a3b62b1ecbbad08b024da

    • SHA256

      dc939640b203aebb656969e5657972216e1c314c2a621e1767747f2e73cd5f19

    • SHA512

      93dbdcdb0ea2b29bba532535bf0451ce0f6214e1424103d175414ce706280d9413b92479eef1414622e1b0428076aaf4c8db58d9e62c78f1861ddc4deb506ffb

    • SSDEEP

      1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqXMxXOYgnJnIJe4SGOMKaK4/z:0R1qf69xak3Mgxm+Y0nae4sMKT6z

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks