General

  • Target

    ee0bd14789a8ecc2ad5f828d092ab371_JaffaCakes118

  • Size

    150KB

  • Sample

    240920-vlpjkaxcld

  • MD5

    ee0bd14789a8ecc2ad5f828d092ab371

  • SHA1

    f941fbc9c863577f5a5ac88ee477f3966d6c0bf0

  • SHA256

    0993a8e2a1ede660ab29dac20d8b95443ba1577a1247c423d7c7fce39820fb51

  • SHA512

    2b1ea45f76b93be2e514cf639a28d997e21d3de39223e2cf949f320352e2537bcd336d52fdb8e366a3d96e02c2da52a257fa48981288ec28bba121f58641ba94

  • SSDEEP

    3072:cHzxfmNGf4Y1Kol0U3GaMEfffffffffo9HJd4NtgIqwc:cHtfmNGfHKouHEfffffffff2pSNtgI9c

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://jpwoodfordco.com/admin/sDs/

exe.dropper

http://luzzeri.com/wp-includes/o9G/

exe.dropper

http://matadebenfica.com/permanente/u/

exe.dropper

https://hapyc.com/wp-content/s/

exe.dropper

https://zycccccc.top/wp-content/lx3/

exe.dropper

https://dezurve.sa/webmail/installer/mqi/

exe.dropper

http://swiftlogisticseg.com/wp-admin/7/

Targets

    • Target

      ee0bd14789a8ecc2ad5f828d092ab371_JaffaCakes118

    • Size

      150KB

    • MD5

      ee0bd14789a8ecc2ad5f828d092ab371

    • SHA1

      f941fbc9c863577f5a5ac88ee477f3966d6c0bf0

    • SHA256

      0993a8e2a1ede660ab29dac20d8b95443ba1577a1247c423d7c7fce39820fb51

    • SHA512

      2b1ea45f76b93be2e514cf639a28d997e21d3de39223e2cf949f320352e2537bcd336d52fdb8e366a3d96e02c2da52a257fa48981288ec28bba121f58641ba94

    • SSDEEP

      3072:cHzxfmNGf4Y1Kol0U3GaMEfffffffffo9HJd4NtgIqwc:cHtfmNGfHKouHEfffffffff2pSNtgI9c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks