General
-
Target
1f4381ea9b273ee987253961856eb0dc_JaffaCakes118
-
Size
241KB
-
Sample
240507-dr43rsff5x
-
MD5
1f4381ea9b273ee987253961856eb0dc
-
SHA1
050eb90abdf186d90bdf29fcf318a404c1c3f3af
-
SHA256
0db3fa18225f3b0e4a30a5303b50f5fd89440d33f726f2b2456ed4ec2b29efb6
-
SHA512
0580741f7c58cad95be11e6cde61e7ff8514df6a4db4c1468eebfcee761fd968d0c29f0a1f615f5e561c25d7fd436a8db5d65252f5ce54df5ebfedd87b95ae3c
-
SSDEEP
3072:wYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////r:40uXnWFchmmcI/o1/XOflT
Behavioral task
behavioral1
Sample
1f4381ea9b273ee987253961856eb0dc_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f4381ea9b273ee987253961856eb0dc_JaffaCakes118.doc
Resource
win10v2004-20240419-en
Malware Config
Extracted
http://www.ksgresearch.org/LLC/z9B/
http://www.mitrausahacontrucion.com/multifunctional-section/X2v4XN/
http://daprofesional.com/data4/rsdbA1h/
http://degisimkalip.com.tr/wp-admin/ZML/
http://da-industrial.com/js/6GGA48AK/
http://cse-engineer.com/cgi-bin/BOiL/
http://casabeethovenlb.com/classes/7SUlG/
Targets
-
-
Target
1f4381ea9b273ee987253961856eb0dc_JaffaCakes118
-
Size
241KB
-
MD5
1f4381ea9b273ee987253961856eb0dc
-
SHA1
050eb90abdf186d90bdf29fcf318a404c1c3f3af
-
SHA256
0db3fa18225f3b0e4a30a5303b50f5fd89440d33f726f2b2456ed4ec2b29efb6
-
SHA512
0580741f7c58cad95be11e6cde61e7ff8514df6a4db4c1468eebfcee761fd968d0c29f0a1f615f5e561c25d7fd436a8db5d65252f5ce54df5ebfedd87b95ae3c
-
SSDEEP
3072:wYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////r:40uXnWFchmmcI/o1/XOflT
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-