General

  • Target

    ee1e91462b97fb9cb670e3e6d79254c1_JaffaCakes118

  • Size

    188KB

  • Sample

    240920-wdk2vayfre

  • MD5

    ee1e91462b97fb9cb670e3e6d79254c1

  • SHA1

    3ba4ae3f484be2d1b7ad8ae927b3ced688dcc93e

  • SHA256

    51eff3c97b1094265d1ef39db7e00c388742dd15db6d603e60b493faa04c352d

  • SHA512

    d4abafecdabc31b69c23a1b47a1aebaa29b077b33be2e7d274917b675c9fb951d795b188d8e1cdcf57ad20c15a6f5e4f0b52742e037b8721b255b36068bee68f

  • SSDEEP

    1536:5GGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilWfm9ITmDST/Ephs7p8cEpY/d8Y:M8rfrzOH98ipg+LTKp

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://amettatravel.com/wp-admin/1/

exe.dropper

http://iqauthority.com/wp-admin/9Id/

exe.dropper

http://www.sifesro.com/wp-includes/o/

exe.dropper

http://oneinsix.com/test/0/

exe.dropper

https://dramacool9.live/scbvq1/sPT/

exe.dropper

http://blog.geekpai.top/rmebw/x/

exe.dropper

https://datxanhmienbac.info/lfb8ii/LmG/

Targets

    • Target

      ee1e91462b97fb9cb670e3e6d79254c1_JaffaCakes118

    • Size

      188KB

    • MD5

      ee1e91462b97fb9cb670e3e6d79254c1

    • SHA1

      3ba4ae3f484be2d1b7ad8ae927b3ced688dcc93e

    • SHA256

      51eff3c97b1094265d1ef39db7e00c388742dd15db6d603e60b493faa04c352d

    • SHA512

      d4abafecdabc31b69c23a1b47a1aebaa29b077b33be2e7d274917b675c9fb951d795b188d8e1cdcf57ad20c15a6f5e4f0b52742e037b8721b255b36068bee68f

    • SSDEEP

      1536:5GGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilWfm9ITmDST/Ephs7p8cEpY/d8Y:M8rfrzOH98ipg+LTKp

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks