General

  • Target

    ed2b8e24f5f5e3bc90865762b466c1f9_JaffaCakes118

  • Size

    200KB

  • Sample

    240920-j2ajssxbjq

  • MD5

    ed2b8e24f5f5e3bc90865762b466c1f9

  • SHA1

    0d4533fdaea8587dd643cdd7b1b4c6fe506c86ea

  • SHA256

    5e954cc5e24e49a088df001fe6932cd5835437d177bc8075047b71acf5ab699a

  • SHA512

    43a24d8457f7d1c2772a85fead4d48355c4d58714098675b273a1c77309daea55e7bfeb77b8345d2286c9a9aadbeb68af7bfa0dd9a2d745a867a87e0167a5c2d

  • SSDEEP

    1536:04tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9hig7ix5EvGtaWWfjPYKwq:04tcTvjvTY140818tIP4ovptLmG2o4

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://veccino56.com/gjpra/4ZR/

exe.dropper

http://girlgeekdinners.com/wp-content/Hpz/

exe.dropper

http://marblingmagpie.com/COPYRIGHT/Ak/

exe.dropper

http://aplicativoipok.net/wp-includes/ONW/

exe.dropper

http://ec2-52-56-233-157.eu-west-2.compute.amazonaws.com/wp-includes/35/

exe.dropper

https://shd7.life/mlktv/r6/

exe.dropper

https://www.hairlineunisexsalon.com/demo/UX/

Targets

    • Target

      ed2b8e24f5f5e3bc90865762b466c1f9_JaffaCakes118

    • Size

      200KB

    • MD5

      ed2b8e24f5f5e3bc90865762b466c1f9

    • SHA1

      0d4533fdaea8587dd643cdd7b1b4c6fe506c86ea

    • SHA256

      5e954cc5e24e49a088df001fe6932cd5835437d177bc8075047b71acf5ab699a

    • SHA512

      43a24d8457f7d1c2772a85fead4d48355c4d58714098675b273a1c77309daea55e7bfeb77b8345d2286c9a9aadbeb68af7bfa0dd9a2d745a867a87e0167a5c2d

    • SSDEEP

      1536:04tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9hig7ix5EvGtaWWfjPYKwq:04tcTvjvTY140818tIP4ovptLmG2o4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks