General
-
Target
50ea96b7c42b908b2821fa832e798db0_JaffaCakes118
-
Size
220KB
-
Sample
240517-xbtrmsda3w
-
MD5
50ea96b7c42b908b2821fa832e798db0
-
SHA1
c71acc8715ae12492ab48ff57df6bb998f11f5d7
-
SHA256
75bf970f98cfafd5b377938aa46073f7818011dfa98561c7592703fe34dd1c92
-
SHA512
fedd43457cadc7f9950b92e7c66e3e4176ec130c41f09a95e00e7d05ba87d62fe974ab7363ce70a7b17901c12552af98fc8079659141d0f5ee998d33b930653e
-
SSDEEP
3072:b4tcTvjvTY140818tIP4ovpLSGju9jDW1M+7up3W:EtcnvE140o8tIP4ap8jDjmcW
Behavioral task
behavioral1
Sample
50ea96b7c42b908b2821fa832e798db0_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
50ea96b7c42b908b2821fa832e798db0_JaffaCakes118.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
http://hottco.com/stats/erd/
http://dutarini.com/cgi-bin/6/
https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/
http://pastaciyiz.biz/wp-includes/fvx/
https://dogaltrm.com/components/r6h/
https://dortislem.net/administrator/c/
https://onyourleftracing.com/cgi-bin/QcC/
Targets
-
-
Target
50ea96b7c42b908b2821fa832e798db0_JaffaCakes118
-
Size
220KB
-
MD5
50ea96b7c42b908b2821fa832e798db0
-
SHA1
c71acc8715ae12492ab48ff57df6bb998f11f5d7
-
SHA256
75bf970f98cfafd5b377938aa46073f7818011dfa98561c7592703fe34dd1c92
-
SHA512
fedd43457cadc7f9950b92e7c66e3e4176ec130c41f09a95e00e7d05ba87d62fe974ab7363ce70a7b17901c12552af98fc8079659141d0f5ee998d33b930653e
-
SSDEEP
3072:b4tcTvjvTY140818tIP4ovpLSGju9jDW1M+7up3W:EtcnvE140o8tIP4ap8jDjmcW
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-