General

  • Target

    3bb343adbcc470170907f52502fa6872_JaffaCakes118

  • Size

    86KB

  • Sample

    240512-x52dksce6y

  • MD5

    3bb343adbcc470170907f52502fa6872

  • SHA1

    3b18b315bdfbe823a4f849705a70be0acf4ebed4

  • SHA256

    62cb2defe8f74e87c30c1d3d42a4831f0b513a3f0631f044a03c7f003c0ae056

  • SHA512

    5f2c4a0a7180220e7965060381146256cdd5175d2be730fd30b99b1d0be826b156d7151a520561ee7e40d023d1755f925c1f54f6e4cf2151752cca50e93141ad

  • SSDEEP

    1536:D2HSXjssocn1kp59gxBK85fBu+auyqpP63rv:D84241k/W48Ir

Malware Config

Targets

    • Target

      3bb343adbcc470170907f52502fa6872_JaffaCakes118

    • Size

      86KB

    • MD5

      3bb343adbcc470170907f52502fa6872

    • SHA1

      3b18b315bdfbe823a4f849705a70be0acf4ebed4

    • SHA256

      62cb2defe8f74e87c30c1d3d42a4831f0b513a3f0631f044a03c7f003c0ae056

    • SHA512

      5f2c4a0a7180220e7965060381146256cdd5175d2be730fd30b99b1d0be826b156d7151a520561ee7e40d023d1755f925c1f54f6e4cf2151752cca50e93141ad

    • SSDEEP

      1536:D2HSXjssocn1kp59gxBK85fBu+auyqpP63rv:D84241k/W48Ir

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

MITRE ATT&CK Enterprise v15

Tasks