General

  • Target

    be3d2470912e98beb59febf067c2938e_JaffaCakes118

  • Size

    159KB

  • Sample

    240824-kkrx7a1hqg

  • MD5

    be3d2470912e98beb59febf067c2938e

  • SHA1

    7acbc2e113581d29ac89e7145f4676d3882c9307

  • SHA256

    7d6ac00d6237e26c6cb997b687508ab6bb2cc9a61d64ea51cb1534aefb802b39

  • SHA512

    afba8fc7d68e6eb2eae56a10960eda0c5e2d673b2efe9d2a8ebca1f23172eb2d9debf3ce7d48fc18ca25bd8a369ce0c406757b78d3367e167378d25bec1c59cd

  • SSDEEP

    1536:TB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5F+a9NPzlnb3WSp:T22TWTogk079THcpOu5UZHP5b3WSp

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://jobcapper.com/8.7.19/hrS/

exe.dropper

http://scoomie.com/wp-content/uploads/mxjsB/

exe.dropper

https://blog.workshots.net/bibqcr9/Eki/

exe.dropper

https://hxoptical.net/wp-admin/91C/

exe.dropper

https://adidasnmdfootlocker.com/nc_assets/F/

exe.dropper

http://socylmediapc.es/tools/D7Ogq/

exe.dropper

http://lombardzista.pl/wp-content/r/

Targets

    • Target

      be3d2470912e98beb59febf067c2938e_JaffaCakes118

    • Size

      159KB

    • MD5

      be3d2470912e98beb59febf067c2938e

    • SHA1

      7acbc2e113581d29ac89e7145f4676d3882c9307

    • SHA256

      7d6ac00d6237e26c6cb997b687508ab6bb2cc9a61d64ea51cb1534aefb802b39

    • SHA512

      afba8fc7d68e6eb2eae56a10960eda0c5e2d673b2efe9d2a8ebca1f23172eb2d9debf3ce7d48fc18ca25bd8a369ce0c406757b78d3367e167378d25bec1c59cd

    • SSDEEP

      1536:TB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5F+a9NPzlnb3WSp:T22TWTogk079THcpOu5UZHP5b3WSp

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks