General
-
Target
031d2c1ec2390f52dc96b2de0e2eed6f_JaffaCakes118
-
Size
61KB
-
Sample
240427-m8bbfshg91
-
MD5
031d2c1ec2390f52dc96b2de0e2eed6f
-
SHA1
9aca6a1d1fa4702b0d58ea85c9ecef86e06fe234
-
SHA256
a5673b432230ad4f3a112840f293249d492f03edc5893d988e35621e4931ba8b
-
SHA512
8243e501a4fe9dedb65cb33515788e3cdf33f1f210495d42b62c6ece51295c90be5020c7854554bb20f36da967d43280b8b327e73fc588ec9a56b02f442d61af
-
SSDEEP
1536:aO+eUd+OApUP2JCZpMfANCGImXMOtOeJpydf0gfJMPSgTFJ:xbADdMYujOtOeJpyd8giPSgTFJ
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20240419-en
Malware Config
Extracted
http://cnnmediaservices.com/wp-admin/czBMOhz/
http://ak3.net/t0XJ/
http://ovday.com/1umq/S5IWl04/
http://gch7.com/wp-includes/Nkwp/
http://chengmikeji.com/wp-includes/9QQ/
http://blog.anseeing.com/sys-cache/h/
http://1sync-wp.x.opencrm.eu/wp-content/Bu/
Targets
-
-
Target
sample
-
Size
152KB
-
MD5
6813de519880958868d49beb2bc27293
-
SHA1
bfd2935e70ae513bf2b2036eade1e476086436d1
-
SHA256
1c71f8ea6feb7151e43dd7a022fed82103545c6e079231fd59df26e00bcdb66b
-
SHA512
083feba93f1e647a757e7ef0d5f53322e51e896654f8b1363d49a1c3d7927ca0843753ac89bbe31700acd346a5c67cc74087abbd8a43e163ade9edffdc5498fe
-
SSDEEP
1536:VCOIDQhDHR4OIDQhDHRdrdi1Ir77zOH98Wj2gpngB+a9r7Qb4HrO4u2Hg:VzrfrzOH98ipgH7I4HrO4u2Hg
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-