General

  • Target

    e0b85383d31efbacabbec98cd482f0a0_JaffaCakes118

  • Size

    142KB

  • Sample

    240914-wh9wrsxbkp

  • MD5

    e0b85383d31efbacabbec98cd482f0a0

  • SHA1

    ae84ccb8a38e1bcf409b0fb23327ec9b28fb9479

  • SHA256

    b2ee4ecb1670894afa8edb69d932d7861cc2eae3fbd8914559e236d18ad50a78

  • SHA512

    9949fdc461ade092e13283a21b0274f2babe3822530d66c68a74432896ccbcc30c7a6b0707aca8678d5cc8d2b29165324aa485f1000eb8524b9d9ed9157debe5

  • SSDEEP

    1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqSMxXOYgnJnIJe4SGOMKaK4/r:0R1qf69xak3MgxmRY0nae4sMKT6r

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ibccglobal.com/thankyou2/ARA/

exe.dropper

http://work.digitalvichar.com/1mv7clu/o/

exe.dropper

http://13.229.25.57/7xdfb/jpA/

exe.dropper

http://binarystationary.com/cgi-bin/5rM/

exe.dropper

http://fmcav.com/images/ZQF/

exe.dropper

https://kodiakheating.com/ldnha/ybI/

exe.dropper

https://khvs.vrfantasy.gallery/igiodbck/eXq/

Targets

    • Target

      e0b85383d31efbacabbec98cd482f0a0_JaffaCakes118

    • Size

      142KB

    • MD5

      e0b85383d31efbacabbec98cd482f0a0

    • SHA1

      ae84ccb8a38e1bcf409b0fb23327ec9b28fb9479

    • SHA256

      b2ee4ecb1670894afa8edb69d932d7861cc2eae3fbd8914559e236d18ad50a78

    • SHA512

      9949fdc461ade092e13283a21b0274f2babe3822530d66c68a74432896ccbcc30c7a6b0707aca8678d5cc8d2b29165324aa485f1000eb8524b9d9ed9157debe5

    • SSDEEP

      1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqSMxXOYgnJnIJe4SGOMKaK4/r:0R1qf69xak3MgxmRY0nae4sMKT6r

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks