General
-
Target
1771e443533954e1f4219536ecab0b05_JaffaCakes118
-
Size
221KB
-
Sample
240505-ng1byage3s
-
MD5
1771e443533954e1f4219536ecab0b05
-
SHA1
cf37bdbfb387aab0b2f2f59e57e08f2636774351
-
SHA256
f764c5a489ae94b2a089f5333c8911cc6f4584805203a09110346af8f427a5cc
-
SHA512
fba85676ab6436843e91c2be099f8e634d0e6f11852d3aa408208b8aaeebfaf34cfd33e613e76186e21a030756729464a8b9d6be467a8469d1c5af097b0a9b7c
-
SSDEEP
3072:b4tcTvjvTY140818tIP4ovpjSGju9jDW1M+7op32:EtcnvE140o8tIP4apUjDjm+2
Behavioral task
behavioral1
Sample
1771e443533954e1f4219536ecab0b05_JaffaCakes118.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1771e443533954e1f4219536ecab0b05_JaffaCakes118.doc
Resource
win10v2004-20240419-en
Malware Config
Extracted
http://hottco.com/stats/erd/
http://dutarini.com/cgi-bin/6/
https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/
http://pastaciyiz.biz/wp-includes/fvx/
https://dogaltrm.com/components/r6h/
https://dortislem.net/administrator/c/
https://onyourleftracing.com/cgi-bin/QcC/
Targets
-
-
Target
1771e443533954e1f4219536ecab0b05_JaffaCakes118
-
Size
221KB
-
MD5
1771e443533954e1f4219536ecab0b05
-
SHA1
cf37bdbfb387aab0b2f2f59e57e08f2636774351
-
SHA256
f764c5a489ae94b2a089f5333c8911cc6f4584805203a09110346af8f427a5cc
-
SHA512
fba85676ab6436843e91c2be099f8e634d0e6f11852d3aa408208b8aaeebfaf34cfd33e613e76186e21a030756729464a8b9d6be467a8469d1c5af097b0a9b7c
-
SSDEEP
3072:b4tcTvjvTY140818tIP4ovpjSGju9jDW1M+7op32:EtcnvE140o8tIP4apUjDjm+2
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-