General

  • Target

    e0092807436ce2e161a913c832a838bb_JaffaCakes118

  • Size

    221KB

  • Sample

    240914-mxsrcszelk

  • MD5

    e0092807436ce2e161a913c832a838bb

  • SHA1

    b1a1c53a926d41c59c0f0ddd39b77fbb21d20072

  • SHA256

    20febcf811bc6dc138f78697d9678bc6fd9fcf1dd34f70904f76032e4b56d73d

  • SHA512

    36845757c456424237d43746c5a2ee2a0525f323f9d3bfc704244f1a7739c89f071020939a90fa01a449d8a87789dc1ef6d2966306f8821b6fcddeb914da6201

  • SSDEEP

    3072:b4tcTvjvTY140818tIP4ovpPSGju9jDW1M+75p3i:EtcnvE140o8tIP4apYjDjmHi

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hottco.com/stats/erd/

exe.dropper

http://dutarini.com/cgi-bin/6/

exe.dropper

https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/

exe.dropper

http://pastaciyiz.biz/wp-includes/fvx/

exe.dropper

https://dogaltrm.com/components/r6h/

exe.dropper

https://dortislem.net/administrator/c/

exe.dropper

https://onyourleftracing.com/cgi-bin/QcC/

Targets

    • Target

      e0092807436ce2e161a913c832a838bb_JaffaCakes118

    • Size

      221KB

    • MD5

      e0092807436ce2e161a913c832a838bb

    • SHA1

      b1a1c53a926d41c59c0f0ddd39b77fbb21d20072

    • SHA256

      20febcf811bc6dc138f78697d9678bc6fd9fcf1dd34f70904f76032e4b56d73d

    • SHA512

      36845757c456424237d43746c5a2ee2a0525f323f9d3bfc704244f1a7739c89f071020939a90fa01a449d8a87789dc1ef6d2966306f8821b6fcddeb914da6201

    • SSDEEP

      3072:b4tcTvjvTY140818tIP4ovpPSGju9jDW1M+75p3i:EtcnvE140o8tIP4apYjDjmHi

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks