General

  • Target

    ea9c24d16117e8a2b598e61c1381798d_JaffaCakes118

  • Size

    217KB

  • Sample

    240919-fda9ms1gkb

  • MD5

    ea9c24d16117e8a2b598e61c1381798d

  • SHA1

    051fdb397089044459bf2a888ac7b8846238ec3c

  • SHA256

    1ee23bc9e2a3807499d0fd736a4503235cc2d46e14429f19ff423fb2095bc38b

  • SHA512

    efd9c22360016f8c7b3ee4847d290a486aa4508cc47ff1d4af151b953901e4bd8e3bbf8a2982a54bef720d2134627940f90b040e4ecc8169c0dadd61fd0d409b

  • SSDEEP

    1536:KB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9/RQ3n7fxdSoNRs:K22TWTogk079THcpOu5UZQ3zBR5gnfz

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://fulfillmententertainment.com/cgi-bin/jO/

exe.dropper

http://meadtimes.com/wp-content/VZrDrTw/

exe.dropper

http://pinturasydecoracionluis.com/wp-admin/fK3/

exe.dropper

http://oconsign.com/cgi-bin/koLViD/

exe.dropper

http://umapreowned.com/wp-admin/XF7RBbs/

exe.dropper

http://kitecorp.ca/wp-includes/kEI98N/

exe.dropper

http://moneyii.com/website/ddeoUDo/

Targets

    • Target

      ea9c24d16117e8a2b598e61c1381798d_JaffaCakes118

    • Size

      217KB

    • MD5

      ea9c24d16117e8a2b598e61c1381798d

    • SHA1

      051fdb397089044459bf2a888ac7b8846238ec3c

    • SHA256

      1ee23bc9e2a3807499d0fd736a4503235cc2d46e14429f19ff423fb2095bc38b

    • SHA512

      efd9c22360016f8c7b3ee4847d290a486aa4508cc47ff1d4af151b953901e4bd8e3bbf8a2982a54bef720d2134627940f90b040e4ecc8169c0dadd61fd0d409b

    • SSDEEP

      1536:KB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9/RQ3n7fxdSoNRs:K22TWTogk079THcpOu5UZQ3zBR5gnfz

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks