General

  • Target

    0a4080360babdb2aaca83ddaafb1d15f_JaffaCakes118

  • Size

    232KB

  • Sample

    240430-wcs13adh25

  • MD5

    0a4080360babdb2aaca83ddaafb1d15f

  • SHA1

    43120922aa1edf943d72ca6a52eb48cb2562889d

  • SHA256

    7def29eab1b4775ede1a532ad941ffb1558e2ea347fb556c7166304987ef1d8a

  • SHA512

    97ce323d3965dc478c1d15759b8f0ca6a8fe243878fac7f170486a0cb76db80cc567531a791597fc93f15b38e58c921359cd75191f6394b7a2a82651be8379c2

  • SSDEEP

    6144:jk3hOdsylKlgxopeiBNhZF+E+W2kdAVhJscU59TQzC1XNteE/nQF1k3EN5Yl8Z:TJscHzCNNtNoFEEN5E8Z

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://jumper.rocks/wp-index.php

xlm40.dropper

https://jumper.yoga/wp-index.php

Targets

    • Target

      0a4080360babdb2aaca83ddaafb1d15f_JaffaCakes118

    • Size

      232KB

    • MD5

      0a4080360babdb2aaca83ddaafb1d15f

    • SHA1

      43120922aa1edf943d72ca6a52eb48cb2562889d

    • SHA256

      7def29eab1b4775ede1a532ad941ffb1558e2ea347fb556c7166304987ef1d8a

    • SHA512

      97ce323d3965dc478c1d15759b8f0ca6a8fe243878fac7f170486a0cb76db80cc567531a791597fc93f15b38e58c921359cd75191f6394b7a2a82651be8379c2

    • SSDEEP

      6144:jk3hOdsylKlgxopeiBNhZF+E+W2kdAVhJscU59TQzC1XNteE/nQF1k3EN5Yl8Z:TJscHzCNNtNoFEEN5E8Z

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks