General

  • Target

    de26972bb293b28eb74ade9cd1c750f8_JaffaCakes118

  • Size

    144KB

  • Sample

    240913-lmdc9awepk

  • MD5

    de26972bb293b28eb74ade9cd1c750f8

  • SHA1

    32f0665970eee3b2b712a9e13cd86a5701879324

  • SHA256

    a4c72f0d5e93dff6abe76ec873aecf3c626c1086d23f1316338c4d4a45eb4aee

  • SHA512

    df5b17256b41e70b9d0288833d990db77bd33dc66d4395304044dc2d140a6a53a8e4cddd49ae5392fa614b09b28a5d6c1d27b370001342672c698e2cb4c4d5fc

  • SSDEEP

    1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqHMxXOYgnJnIJe4SGOMKaK4/T:0R1qf69xak3MgxmuY0nae4sMKT6T

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ibccglobal.com/thankyou2/ARA/

exe.dropper

http://work.digitalvichar.com/1mv7clu/o/

exe.dropper

http://13.229.25.57/7xdfb/jpA/

exe.dropper

http://binarystationary.com/cgi-bin/5rM/

exe.dropper

http://fmcav.com/images/ZQF/

exe.dropper

https://kodiakheating.com/ldnha/ybI/

exe.dropper

https://khvs.vrfantasy.gallery/igiodbck/eXq/

Targets

    • Target

      de26972bb293b28eb74ade9cd1c750f8_JaffaCakes118

    • Size

      144KB

    • MD5

      de26972bb293b28eb74ade9cd1c750f8

    • SHA1

      32f0665970eee3b2b712a9e13cd86a5701879324

    • SHA256

      a4c72f0d5e93dff6abe76ec873aecf3c626c1086d23f1316338c4d4a45eb4aee

    • SHA512

      df5b17256b41e70b9d0288833d990db77bd33dc66d4395304044dc2d140a6a53a8e4cddd49ae5392fa614b09b28a5d6c1d27b370001342672c698e2cb4c4d5fc

    • SSDEEP

      1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqHMxXOYgnJnIJe4SGOMKaK4/T:0R1qf69xak3MgxmuY0nae4sMKT6T

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks