General

  • Target

    ebe39e8732bc9ba102dfb014f422ca2e_JaffaCakes118

  • Size

    88KB

  • Sample

    240919-wh6t4ssakg

  • MD5

    ebe39e8732bc9ba102dfb014f422ca2e

  • SHA1

    150477cba969e4b7f6b40ee6a9b3c0f7cd998dfc

  • SHA256

    c6a27327929ea0e7b66df5263dd5c74529701dddba28593a2cad44768f5054fd

  • SHA512

    08acb2bff3efab217e760c77cf7424aaf44e2be3a6ad454243b77b6967d0ea5f6b6ac2b83220e24a0a2764aa828ab96026bd5b4dab17f5bdc6f84b12fd8ab654

  • SSDEEP

    1536:jptJlmrJpmxlRw99NBP+aE8CxaupItj8SWnQt:Nte2dw99fdupuj

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://4surskate.com/vKi

exe.dropper

http://riakom.com/T

exe.dropper

http://zavod-pt.com/T

exe.dropper

http://natco-pharma.com/PRBHaG

exe.dropper

http://bitwaopoznan.pl//gp6

Targets

    • Target

      ebe39e8732bc9ba102dfb014f422ca2e_JaffaCakes118

    • Size

      88KB

    • MD5

      ebe39e8732bc9ba102dfb014f422ca2e

    • SHA1

      150477cba969e4b7f6b40ee6a9b3c0f7cd998dfc

    • SHA256

      c6a27327929ea0e7b66df5263dd5c74529701dddba28593a2cad44768f5054fd

    • SHA512

      08acb2bff3efab217e760c77cf7424aaf44e2be3a6ad454243b77b6967d0ea5f6b6ac2b83220e24a0a2764aa828ab96026bd5b4dab17f5bdc6f84b12fd8ab654

    • SSDEEP

      1536:jptJlmrJpmxlRw99NBP+aE8CxaupItj8SWnQt:Nte2dw99fdupuj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks