General

  • Target

    d61469ebe99cbb39b90088f854119971_JaffaCakes118

  • Size

    261KB

  • Sample

    240909-lw23zasbnr

  • MD5

    d61469ebe99cbb39b90088f854119971

  • SHA1

    34b41c33c1a8517d926d33db8f919bc93c7bb16f

  • SHA256

    ae9a7b94c9c8ace70360f1bce28f468b7ce09ac955332425db6cb560ff65f94f

  • SHA512

    c46168bb4e8a1a28bb7820fec300ac69d88aee279e2644dbba8beaf5793d99b7c22ceacaa6692c3f5ce290389205622e1ced4f77b57b83489bb7a2eb47a2b81f

  • SSDEEP

    3072:5OzPM83524CCyCyMmq5YZF8yDtAKPzjL/xSu90OoiLuDKZXfwKeljR1k:sb25CFk8stRbxUOmD+XfwLg

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://localfreelancersng.com/JJ5na9IyL

exe.dropper

http://pobedastaff.ru/6iYWKl5I_MG

exe.dropper

http://wellbeinghomecareservices.co.uk/A9Y90usX88aRT

exe.dropper

http://vkckd.kultkam.ru/QUxQZUG_9i

exe.dropper

http://beautyandbrainsmagazine.site/cfmGNuDVbnc50bks

Targets

    • Target

      d61469ebe99cbb39b90088f854119971_JaffaCakes118

    • Size

      261KB

    • MD5

      d61469ebe99cbb39b90088f854119971

    • SHA1

      34b41c33c1a8517d926d33db8f919bc93c7bb16f

    • SHA256

      ae9a7b94c9c8ace70360f1bce28f468b7ce09ac955332425db6cb560ff65f94f

    • SHA512

      c46168bb4e8a1a28bb7820fec300ac69d88aee279e2644dbba8beaf5793d99b7c22ceacaa6692c3f5ce290389205622e1ced4f77b57b83489bb7a2eb47a2b81f

    • SSDEEP

      3072:5OzPM83524CCyCyMmq5YZF8yDtAKPzjL/xSu90OoiLuDKZXfwKeljR1k:sb25CFk8stRbxUOmD+XfwLg

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks