General

  • Target

    eaa94f2700c2fb2a8bf8d8c556a147ff_JaffaCakes118

  • Size

    188KB

  • Sample

    240919-f17alashmj

  • MD5

    eaa94f2700c2fb2a8bf8d8c556a147ff

  • SHA1

    2e019b9cf69a16371a87b72c78ef8ec9d17cd8ee

  • SHA256

    20afdfa7a7c7a299565cdd046c41bcbea4b1cbdc4041edc9f0e51d52dac04a0c

  • SHA512

    5f0c515563ffbc6c91e77091a8444a3c614e1d03fd9c794b73fe999c073ca40e1fb86ac6a7dc67fa660c5c8e4f64cd70134cac8cb60a6dcd31e0b933b8ab5756

  • SSDEEP

    1536:rrdi1Ir77zOH98Wj2gpngt+a9xG37MgT7TxZk5tBRt9k6p+A:rrfrzOH98ipgkrMgT3ytHt9Zp+A

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://geisterhouse.com/cgi-bin/LAb1/

exe.dropper

http://amyemitchell.com/themes/w/

exe.dropper

http://forestanalytics.net/images/57A7/

exe.dropper

https://konican.com/cgi-bin/cWu/

exe.dropper

http://strike3productions.com/squad/3aV6xrH/

exe.dropper

http://riandutra.com/img/wOMENgh/

exe.dropper

http://justinscott.com.au/sites/rRS/

Targets

    • Target

      eaa94f2700c2fb2a8bf8d8c556a147ff_JaffaCakes118

    • Size

      188KB

    • MD5

      eaa94f2700c2fb2a8bf8d8c556a147ff

    • SHA1

      2e019b9cf69a16371a87b72c78ef8ec9d17cd8ee

    • SHA256

      20afdfa7a7c7a299565cdd046c41bcbea4b1cbdc4041edc9f0e51d52dac04a0c

    • SHA512

      5f0c515563ffbc6c91e77091a8444a3c614e1d03fd9c794b73fe999c073ca40e1fb86ac6a7dc67fa660c5c8e4f64cd70134cac8cb60a6dcd31e0b933b8ab5756

    • SSDEEP

      1536:rrdi1Ir77zOH98Wj2gpngt+a9xG37MgT7TxZk5tBRt9k6p+A:rrfrzOH98ipgkrMgT3ytHt9Zp+A

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks