General

  • Target

    ed97c23ae28330668ac7857640f8e9d1_JaffaCakes118

  • Size

    202KB

  • Sample

    240920-pqhzpawerh

  • MD5

    ed97c23ae28330668ac7857640f8e9d1

  • SHA1

    c80fa96e145290028cb144657c0f2e357e524df3

  • SHA256

    608ee8e057af25aa01d6449635cdb3e8fe78f8ca85e7482476171fbba8346514

  • SHA512

    11b113bb1090d6b3974a66300de9dd5e12a9b2a5a1abed974e4971d6ad6a479d03416ac7b7a054bd0f8f0bc5c5cba2daa7d4894f8dc053b3ecfaedcb71271a9e

  • SSDEEP

    3072:Z2y/Gdy5ktGDWLS0HZWD5w8K7Nk9yD7IBUgNf6EOpwm53Rt:Z2k4NtGiL3HJk9yD7bkf6Eqwm53Rt

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://femminent.com/wp/UqU/

exe.dropper

http://liberty.blvrdev.com/stats/bLH/

exe.dropper

http://milkteaway.azurewebsites.net/calendar/bNmo99828/

exe.dropper

http://nehashetty.xyz/wp-admin/vNWZ/

exe.dropper

http://storeofofficial.shop/pokjbg746ihrtr/3u/

Targets

    • Target

      ed97c23ae28330668ac7857640f8e9d1_JaffaCakes118

    • Size

      202KB

    • MD5

      ed97c23ae28330668ac7857640f8e9d1

    • SHA1

      c80fa96e145290028cb144657c0f2e357e524df3

    • SHA256

      608ee8e057af25aa01d6449635cdb3e8fe78f8ca85e7482476171fbba8346514

    • SHA512

      11b113bb1090d6b3974a66300de9dd5e12a9b2a5a1abed974e4971d6ad6a479d03416ac7b7a054bd0f8f0bc5c5cba2daa7d4894f8dc053b3ecfaedcb71271a9e

    • SSDEEP

      3072:Z2y/Gdy5ktGDWLS0HZWD5w8K7Nk9yD7IBUgNf6EOpwm53Rt:Z2k4NtGiL3HJk9yD7bkf6Eqwm53Rt

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks