General

  • Target

    JaffaCakes118_06f24f9cc306ec79fd8e4e40aa353baf

  • Size

    68KB

  • Sample

    250519-knpbgadl8s

  • MD5

    06f24f9cc306ec79fd8e4e40aa353baf

  • SHA1

    074337af03e7b4dda3f549223bd6904924d8fe55

  • SHA256

    b7851f3d1b2f7cd10b220613c74ce821206ba02c6349ebef9dc42af8f6710282

  • SHA512

    cbd63bf034cad6f27ced4e540555a8cd19760b85c59e92612a590793a0abd31937e3bc141889a2bd68a92f3dce5b1326ae3ddfdf7c6e1f84a4fbe8e3e8d10c70

  • SSDEEP

    768:Dh4CFf8Zt01Q/tVq/utcJ4AI4Ti8RkEZFwH6w4W8uacj9Z7L1H:DqCFF1gttvAI4Ti8XZOHAM

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://wog92bqzqg1m9j4i3.website/isapi/AGotlxOSF18ZgmALJxAA0dq1r3b8MWUI2lVkwImlrpzQQQ0yi7LSjaUSez8Thcchp4P1ZCo2x-sgJpj7cuSvbZro2nruY9SvEqwYzQh5A0fco6SwC9xKGMsQjDj8zlyUZ2cJrYhtnlpuxcgHXmb1Y65ttyOhjFYBk9aqs-jEPdG3PZ0ZlJdUPZ5tZUBEURg/Gzuo8y86GLiF93GOWfVw7kzcM-BAqxEWL/MpGlL1l/pXDTAO23C8RgvQGiLsvUswQ6LBHderO8MDsOItn97dzg__

Targets

    • Target

      JaffaCakes118_06f24f9cc306ec79fd8e4e40aa353baf

    • Size

      68KB

    • MD5

      06f24f9cc306ec79fd8e4e40aa353baf

    • SHA1

      074337af03e7b4dda3f549223bd6904924d8fe55

    • SHA256

      b7851f3d1b2f7cd10b220613c74ce821206ba02c6349ebef9dc42af8f6710282

    • SHA512

      cbd63bf034cad6f27ced4e540555a8cd19760b85c59e92612a590793a0abd31937e3bc141889a2bd68a92f3dce5b1326ae3ddfdf7c6e1f84a4fbe8e3e8d10c70

    • SSDEEP

      768:Dh4CFf8Zt01Q/tVq/utcJ4AI4Ti8RkEZFwH6w4W8uacj9Z7L1H:DqCFF1gttvAI4Ti8XZOHAM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v16

Tasks