General

  • Target

    eea2693b5c7a9e5d218ec0942337eb9c_JaffaCakes118

  • Size

    194KB

  • Sample

    240920-3dryqathql

  • MD5

    eea2693b5c7a9e5d218ec0942337eb9c

  • SHA1

    d00f9a11798b0cfd9c57ae658f6ccc65c5badd66

  • SHA256

    60ebb60bdbd9d062410367b982c74e9f4d3a5a857f4b3cbbfd64f9521d01472c

  • SHA512

    96b29cba17ef46de8e7356ed7800f5400812643be227db2a923e7f52fab0ef80015f43730d836f9fd9e149edba62f8c095cbe76dba5df8fe1a04414a4f6ff453

  • SSDEEP

    1536:DGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilqfqdFTaFVT/EA8s9p8cjMfmVS2:+rfrzOH98ipgbd58c5M

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://boys86.com/wp-admin/mO/

exe.dropper

http://dacyclin.com/3qx/Z/

exe.dropper

https://fepami.com/wp-includes/oRT/

exe.dropper

https://xnxxfullhd.com/wp-admin/NAK/

exe.dropper

https://www.business-management-degree.net/wp-snapshots/W/

exe.dropper

http://homestay.design/wordpress/M/

exe.dropper

https://csc-comunity.com/wp-admin/6DW/

Targets

    • Target

      eea2693b5c7a9e5d218ec0942337eb9c_JaffaCakes118

    • Size

      194KB

    • MD5

      eea2693b5c7a9e5d218ec0942337eb9c

    • SHA1

      d00f9a11798b0cfd9c57ae658f6ccc65c5badd66

    • SHA256

      60ebb60bdbd9d062410367b982c74e9f4d3a5a857f4b3cbbfd64f9521d01472c

    • SHA512

      96b29cba17ef46de8e7356ed7800f5400812643be227db2a923e7f52fab0ef80015f43730d836f9fd9e149edba62f8c095cbe76dba5df8fe1a04414a4f6ff453

    • SSDEEP

      1536:DGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilqfqdFTaFVT/EA8s9p8cjMfmVS2:+rfrzOH98ipgbd58c5M

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks