General

  • Target

    ea4ffc3d8b9a31e11d72b7eab787bae8_JaffaCakes118

  • Size

    247KB

  • Sample

    240409-sxzgssag99

  • MD5

    ea4ffc3d8b9a31e11d72b7eab787bae8

  • SHA1

    d3d43dce8946a5c585c2eab607255250bb162b51

  • SHA256

    f17e95c7e3dce9e03c629a9e0745cd7ff01c2686036636006b4463267e2b3b5a

  • SHA512

    74070f4f71042347127ae98f43189df75c25c517650ef789c5886e8fc5d6014c02c2ffe99bf4e1664f71a8752e6ec2b2eed46d4b2a4fc9f8392edfeb393ec498

  • SSDEEP

    6144:5Kpb8rGYrMPe3q7Q0XV5xtuEsi8/dg59jWvcZZdtjq15OD7IvOEPD0lgvS3enw7W:U9jFrjmkD7IvLDK3vLvfn1+2M

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://samtnpy.org/bveCGKTX/ghb.html

xlm40.dropper

https://massngo.org/dXKvyKV9v8c/ghb.html

xlm40.dropper

https://vathiriyar.org/uy0Tk0keJUr/ghb.html

Targets

    • Target

      ea4ffc3d8b9a31e11d72b7eab787bae8_JaffaCakes118

    • Size

      247KB

    • MD5

      ea4ffc3d8b9a31e11d72b7eab787bae8

    • SHA1

      d3d43dce8946a5c585c2eab607255250bb162b51

    • SHA256

      f17e95c7e3dce9e03c629a9e0745cd7ff01c2686036636006b4463267e2b3b5a

    • SHA512

      74070f4f71042347127ae98f43189df75c25c517650ef789c5886e8fc5d6014c02c2ffe99bf4e1664f71a8752e6ec2b2eed46d4b2a4fc9f8392edfeb393ec498

    • SSDEEP

      6144:5Kpb8rGYrMPe3q7Q0XV5xtuEsi8/dg59jWvcZZdtjq15OD7IvOEPD0lgvS3enw7W:U9jFrjmkD7IvLDK3vLvfn1+2M

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks