General

  • Target

    ed16fa62688ff2c245f7dbc6b843de6c_JaffaCakes118

  • Size

    227KB

  • Sample

    240920-h4yhzavble

  • MD5

    ed16fa62688ff2c245f7dbc6b843de6c

  • SHA1

    9a907d5873d1a92b7236d08773489a4626b2db3b

  • SHA256

    fff5ababe982e206dcb90025f198c2dee4bb9d0e8fee9a7b146ea3421db0cc78

  • SHA512

    ae8e176a9ae79ae33b85055f633d84c3dd135437f98fbf78a431fe8db0977d3ac30b0bf7793900523f14e61c00c82626cadc5a7326d035a777c2bd53948c3644

  • SSDEEP

    3072:1j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkOl3O+zzqEwQbR9T:1HgtEWPsL/aTyT9GkOle+zzXwQbRV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.hammockworld.co.nz/imgs/xyTBsz/

exe.dropper

http://seatrade.com.eg/index_files/OGUwzJl/

exe.dropper

http://www.nancywhite-realtor.com/wp-content/qavvddXh/

exe.dropper

http://skullmedia.de/befroe.de/eyiY/

exe.dropper

https://damoshushu.com/wp-content/xhcurZgXJ/

Targets

    • Target

      ed16fa62688ff2c245f7dbc6b843de6c_JaffaCakes118

    • Size

      227KB

    • MD5

      ed16fa62688ff2c245f7dbc6b843de6c

    • SHA1

      9a907d5873d1a92b7236d08773489a4626b2db3b

    • SHA256

      fff5ababe982e206dcb90025f198c2dee4bb9d0e8fee9a7b146ea3421db0cc78

    • SHA512

      ae8e176a9ae79ae33b85055f633d84c3dd135437f98fbf78a431fe8db0977d3ac30b0bf7793900523f14e61c00c82626cadc5a7326d035a777c2bd53948c3644

    • SSDEEP

      3072:1j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkOl3O+zzqEwQbR9T:1HgtEWPsL/aTyT9GkOle+zzXwQbRV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks