General

  • Target

    ce3456eeddde5542839a26e26e8fcef6_JaffaCakes118

  • Size

    220KB

  • Sample

    240906-ab61mswcjc

  • MD5

    ce3456eeddde5542839a26e26e8fcef6

  • SHA1

    e2ba6846d1622221ca2167ee90e2586e5dab4735

  • SHA256

    507e7abb40947dfb7985ab2e1986bef80a9352e6cb5770c369422562a4df203d

  • SHA512

    e3f10b314575af8ad277e671d50010208dc374653bbe42e0a7d2d601126d0803d1ee203ab7f2eaaac5f4e4e9d6c8719404568166446dc4bb84f30a4d4dd9d85d

  • SSDEEP

    3072:b4tcTvjvTY140818tIP4ovpkSGju9jDW1M+7Wp3C:EtcnvE140o8tIP4apHjDjmkC

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hottco.com/stats/erd/

exe.dropper

http://dutarini.com/cgi-bin/6/

exe.dropper

https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/

exe.dropper

http://pastaciyiz.biz/wp-includes/fvx/

exe.dropper

https://dogaltrm.com/components/r6h/

exe.dropper

https://dortislem.net/administrator/c/

exe.dropper

https://onyourleftracing.com/cgi-bin/QcC/

Targets

    • Target

      ce3456eeddde5542839a26e26e8fcef6_JaffaCakes118

    • Size

      220KB

    • MD5

      ce3456eeddde5542839a26e26e8fcef6

    • SHA1

      e2ba6846d1622221ca2167ee90e2586e5dab4735

    • SHA256

      507e7abb40947dfb7985ab2e1986bef80a9352e6cb5770c369422562a4df203d

    • SHA512

      e3f10b314575af8ad277e671d50010208dc374653bbe42e0a7d2d601126d0803d1ee203ab7f2eaaac5f4e4e9d6c8719404568166446dc4bb84f30a4d4dd9d85d

    • SSDEEP

      3072:b4tcTvjvTY140818tIP4ovpkSGju9jDW1M+7Wp3C:EtcnvE140o8tIP4apHjDjmkC

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks