General

  • Target

    eac0c3fc2f11425eecf5394b4f74dc34_JaffaCakes118

  • Size

    150KB

  • Sample

    240919-g5mbnavfkm

  • MD5

    eac0c3fc2f11425eecf5394b4f74dc34

  • SHA1

    6e53b4a44c614fa3d753d5b33c7365efa2164f31

  • SHA256

    0ad6a98cb8928f61b66604f06096da02a0fa94d3c5e67db08ead722adddc8f7c

  • SHA512

    b41bb37a2561879991255cf349dff1bed762d455b8755974a5acaf2c57ff9ff5a4979db531ec9b0beff09819aa4304d433c4d38ba7ba94cb018ee0b0c42fc385

  • SSDEEP

    1536:mPiRmz80TdayTTtlj8S1PyswwPOhjS8lIAkAkB445TEgrO3jSWAg83tle1ZZ029Q:T422TWTogk079THcpOu5UZ+UQ4y/jP

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://h2a1.com/uf8vu/U/

exe.dropper

http://www.almakaaseb.com/wp-includes/P/

exe.dropper

http://theitnconsultant.com/wp-includes/t/

exe.dropper

http://carstarai.com/icon/D/

exe.dropper

http://bug.chihuahuamediaprojects.com/wp-includes/u/

exe.dropper

https://aecc.dev.caveim.net/wp-admin/dZ/

exe.dropper

http://phimsex.2xxhub.com/wp-content/esp/5ur8drbma/6qH/

Targets

    • Target

      eac0c3fc2f11425eecf5394b4f74dc34_JaffaCakes118

    • Size

      150KB

    • MD5

      eac0c3fc2f11425eecf5394b4f74dc34

    • SHA1

      6e53b4a44c614fa3d753d5b33c7365efa2164f31

    • SHA256

      0ad6a98cb8928f61b66604f06096da02a0fa94d3c5e67db08ead722adddc8f7c

    • SHA512

      b41bb37a2561879991255cf349dff1bed762d455b8755974a5acaf2c57ff9ff5a4979db531ec9b0beff09819aa4304d433c4d38ba7ba94cb018ee0b0c42fc385

    • SSDEEP

      1536:mPiRmz80TdayTTtlj8S1PyswwPOhjS8lIAkAkB445TEgrO3jSWAg83tle1ZZ029Q:T422TWTogk079THcpOu5UZ+UQ4y/jP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks