General
-
Target
0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118
-
Size
65KB
-
Sample
240428-bx2tgsde3t
-
MD5
0413f92d3b2f6300a0ed5d6d362ef09c
-
SHA1
e0ed8f26783e15a4fcc44b13997912295dc52bad
-
SHA256
58c6de98959ad1e8fa0c907b8132e557f516944676936af659f6c80b1ac2804e
-
SHA512
20ae21f5f8456c4cbb3a294f54aaf4c2ab7330a2d994f91eee7ac2f1a56b08697821af3158f3050d37878b166d8a9930ba12ccefb2f9339c87b921acef952388
-
SSDEEP
768:cpJcaUitGAlmrJpmxlzC+w99NBz+1o80cZBv0fNNfw/i9m57MI2:cptJlmrJpmxlRw99NBz+a8vBi
Behavioral task
behavioral1
Sample
0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
http://abporter.org/zhniYMNIL
http://bearinmindstrategies.com/of7Cpb8
http://ondacapital.es/EwCyzzc
http://landspa.ir/Nl9U64Eg0
http://shoshana.ge/QwlUmzzVaF
Targets
-
-
Target
0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118
-
Size
65KB
-
MD5
0413f92d3b2f6300a0ed5d6d362ef09c
-
SHA1
e0ed8f26783e15a4fcc44b13997912295dc52bad
-
SHA256
58c6de98959ad1e8fa0c907b8132e557f516944676936af659f6c80b1ac2804e
-
SHA512
20ae21f5f8456c4cbb3a294f54aaf4c2ab7330a2d994f91eee7ac2f1a56b08697821af3158f3050d37878b166d8a9930ba12ccefb2f9339c87b921acef952388
-
SSDEEP
768:cpJcaUitGAlmrJpmxlzC+w99NBz+1o80cZBv0fNNfw/i9m57MI2:cptJlmrJpmxlRw99NBz+a8vBi
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-