General

  • Target

    ee9da2b43f42748015ec1c0bda2fa6aa_JaffaCakes118

  • Size

    44KB

  • Sample

    240920-27bcdstcmd

  • MD5

    ee9da2b43f42748015ec1c0bda2fa6aa

  • SHA1

    286ce8290e686b338020b7952df9bda9db87f291

  • SHA256

    759b48cb59e0c8bef80a7f181027dedce6579aababfd19dd6fb78dfc1fd10aa6

  • SHA512

    ff60977e8ccc3e4203f144279cef1c3ccbeeb5ef15f68788a307a9e02a6708a1da984b8a1a8bfa2490ae94c32c1f980468f0f1a4db9daba7c95bda7d4042c2b2

  • SSDEEP

    384:wKn8iSUR/8dA4qNLi08krWuHzQjbuMZZzkExygcPEdEsKhb2YOPygdP0jZPtI:1/qvaLiEMbZZ19yhEd6yPJJa

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://54.244.182.87:80

Targets

    • Target

      ee9da2b43f42748015ec1c0bda2fa6aa_JaffaCakes118

    • Size

      44KB

    • MD5

      ee9da2b43f42748015ec1c0bda2fa6aa

    • SHA1

      286ce8290e686b338020b7952df9bda9db87f291

    • SHA256

      759b48cb59e0c8bef80a7f181027dedce6579aababfd19dd6fb78dfc1fd10aa6

    • SHA512

      ff60977e8ccc3e4203f144279cef1c3ccbeeb5ef15f68788a307a9e02a6708a1da984b8a1a8bfa2490ae94c32c1f980468f0f1a4db9daba7c95bda7d4042c2b2

    • SSDEEP

      384:wKn8iSUR/8dA4qNLi08krWuHzQjbuMZZzkExygcPEdEsKhb2YOPygdP0jZPtI:1/qvaLiEMbZZ19yhEd6yPJJa

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks