General

  • Target

    add4f6109b4bb7f365d21691350cf982_JaffaCakes118

  • Size

    160KB

  • Sample

    240820-ewnr1sshqg

  • MD5

    add4f6109b4bb7f365d21691350cf982

  • SHA1

    7430eaf0d52013e90b461a3a76c9bc715affccd4

  • SHA256

    818b06749e98293ab2cd52b9c405ada1373ce68de595d2087cf854cb74e15632

  • SHA512

    647e4809ee0106bd2356f6ee651cc252d6f718993cc0653a2d58058dc8b29ccdb8f3beebc5b8d48a62f9870314603a1ceb2bac25b03315e00eb1881438faf4b7

  • SSDEEP

    1536:TB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5F+a9ePzlnb3NS7:T22TWTogk079THcpOu5UZAP5b3NS7

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://jobcapper.com/8.7.19/hrS/

exe.dropper

http://scoomie.com/wp-content/uploads/mxjsB/

exe.dropper

https://blog.workshots.net/bibqcr9/Eki/

exe.dropper

https://hxoptical.net/wp-admin/91C/

exe.dropper

https://adidasnmdfootlocker.com/nc_assets/F/

exe.dropper

http://socylmediapc.es/tools/D7Ogq/

exe.dropper

http://lombardzista.pl/wp-content/r/

Targets

    • Target

      add4f6109b4bb7f365d21691350cf982_JaffaCakes118

    • Size

      160KB

    • MD5

      add4f6109b4bb7f365d21691350cf982

    • SHA1

      7430eaf0d52013e90b461a3a76c9bc715affccd4

    • SHA256

      818b06749e98293ab2cd52b9c405ada1373ce68de595d2087cf854cb74e15632

    • SHA512

      647e4809ee0106bd2356f6ee651cc252d6f718993cc0653a2d58058dc8b29ccdb8f3beebc5b8d48a62f9870314603a1ceb2bac25b03315e00eb1881438faf4b7

    • SSDEEP

      1536:TB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5F+a9ePzlnb3NS7:T22TWTogk079THcpOu5UZAP5b3NS7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks