General
-
Target
61a93c67dbe831274e14795305afc681_JaffaCakes118
-
Size
85KB
-
Sample
240521-b8hjzsec64
-
MD5
61a93c67dbe831274e14795305afc681
-
SHA1
4800614e77148822325fdd6a012ff5db8d08cc4f
-
SHA256
2cda89bd9cbc1c71ca3df9a192eaa2b51b8176d66ff537b62f8162ea7e8fa3f6
-
SHA512
38673591d9b952780b5353751d24c01e9422afc807bd1b961402984605afe19196421cb7d5d46f38484ce6444a70cfcb5eacb87c32cfd1a6551f0476eab56843
-
SSDEEP
1536:IptJlmrJpmxlRw99NBZ+a5YuB2DZrVeoBE:Qte2dw99fsuBYZrom
Behavioral task
behavioral1
Sample
61a93c67dbe831274e14795305afc681_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
61a93c67dbe831274e14795305afc681_JaffaCakes118.doc
Resource
win10v2004-20240508-en
Malware Config
Extracted
http://arkanddove.com/7Ts
http://bearinmindstrategies.com/JZ2d
http://bluemoonweather.org/tcp
http://boczon.pl/Z
http://antallez.com/Ct
Targets
-
-
Target
61a93c67dbe831274e14795305afc681_JaffaCakes118
-
Size
85KB
-
MD5
61a93c67dbe831274e14795305afc681
-
SHA1
4800614e77148822325fdd6a012ff5db8d08cc4f
-
SHA256
2cda89bd9cbc1c71ca3df9a192eaa2b51b8176d66ff537b62f8162ea7e8fa3f6
-
SHA512
38673591d9b952780b5353751d24c01e9422afc807bd1b961402984605afe19196421cb7d5d46f38484ce6444a70cfcb5eacb87c32cfd1a6551f0476eab56843
-
SSDEEP
1536:IptJlmrJpmxlRw99NBZ+a5YuB2DZrVeoBE:Qte2dw99fsuBYZrom
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-