General

  • Target

    ee69332cee99615667e1e2977001c8e9_JaffaCakes118

  • Size

    143KB

  • Sample

    240920-zsltgaxflf

  • MD5

    ee69332cee99615667e1e2977001c8e9

  • SHA1

    c6c38aef2cd89dd57b8984d34d96eaa18c9ff987

  • SHA256

    faf7ed24aa5991a653301120b138611b6ab03b4b6241d93739d871c81cda1540

  • SHA512

    4b012c0b890bac5aaf142dce86f2ce7bc0ff36d8b8cf73079bee3904ad3d8a9e38dc3d75eb9d87f351e3c44e286910ce3f4f743ba145ae81102a4bb27c747f5f

  • SSDEEP

    1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmq4MxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3MgxmrY0nae4sMKT6j

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ibccglobal.com/thankyou2/ARA/

exe.dropper

http://work.digitalvichar.com/1mv7clu/o/

exe.dropper

http://13.229.25.57/7xdfb/jpA/

exe.dropper

http://binarystationary.com/cgi-bin/5rM/

exe.dropper

http://fmcav.com/images/ZQF/

exe.dropper

https://kodiakheating.com/ldnha/ybI/

exe.dropper

https://khvs.vrfantasy.gallery/igiodbck/eXq/

Targets

    • Target

      ee69332cee99615667e1e2977001c8e9_JaffaCakes118

    • Size

      143KB

    • MD5

      ee69332cee99615667e1e2977001c8e9

    • SHA1

      c6c38aef2cd89dd57b8984d34d96eaa18c9ff987

    • SHA256

      faf7ed24aa5991a653301120b138611b6ab03b4b6241d93739d871c81cda1540

    • SHA512

      4b012c0b890bac5aaf142dce86f2ce7bc0ff36d8b8cf73079bee3904ad3d8a9e38dc3d75eb9d87f351e3c44e286910ce3f4f743ba145ae81102a4bb27c747f5f

    • SSDEEP

      1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmq4MxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3MgxmrY0nae4sMKT6j

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks