General
-
Target
7ab40b581d6ea4f9cbd231059cb67889_JaffaCakes118
-
Size
79KB
-
Sample
240527-11vxsabg9w
-
MD5
7ab40b581d6ea4f9cbd231059cb67889
-
SHA1
8307b3e6daf662a85b1ea284b5e26e40232f5b8d
-
SHA256
76258e61268d9f6bd295237be0d8b756f0f830926ff35b49f37ecc8d57e6d4fd
-
SHA512
e3688b2bfdda46e902d94a60b70c6a74d92572ba3c5d55077c52a0199d3f068c4e221d36555a54e7cb8b64a43ef1030c318f2dfe1df09b19df3f62fc4ea07b1f
-
SSDEEP
1536:i9FVFNrZLXB6tBXAUFW9LkoGwNAd4ANdY8dVyyMK3phgqi4D:eTrLg3DoGf4q28dUhwpSCD
Behavioral task
behavioral1
Sample
UPS-X7013FXI85.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
UPS-X7013FXI85.doc
Resource
win10v2004-20240426-en
Malware Config
Extracted
http://kompy.cba.pl/gif/lN_dl/
http://fisiobianchini.com.br/wp-content/uploads/2016/05/S_U/
http://dev.dimatech.org/wp-admin/Hu_jj/
http://juangrela.com/admin/bB_m/
http://coupedecheveux.org/yu71t1x/c_V/
Targets
-
-
Target
UPS-X7013FXI85.js
-
Size
166KB
-
MD5
2ead130d4e6ff9f1e2f61888563b29c0
-
SHA1
90ef697d3e1717af5a1659f4827452760ed1f120
-
SHA256
9d638e393cf9c49ee287c8580b501b52b0db09aa60e03668d04c25f608d70a9c
-
SHA512
561c7ccd015aba34dff29a41a635bda93831a32151f2836f3188a48f11e72f20493c063a7161a831e12294ff8658d548dc7ed9e02fdf4216dff1c60552ba6e57
-
SSDEEP
3072:w77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qvIlc5hlPOwy7/FswxoLL5R:w77HUUUUUUUUUUUUUUUUUUUT52VJcPlv
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-