General
-
Target
871b78f119796ee610a09b3a9cc822b1_JaffaCakes118
-
Size
61KB
-
Sample
240531-qcf4lsac77
-
MD5
871b78f119796ee610a09b3a9cc822b1
-
SHA1
2ca32ab07dae505ad800d4298b1f6578eab5bdc8
-
SHA256
1f5d57b0ab061a873279f01685738e025182d1b04b6f92b384439032f4832635
-
SHA512
2a5239e8b1df0cb2b7c97c8f821f19723ff3bac1809a0e277493555b93d108442a8a695eb575c2576adec036d91a59c346ff7af29ecc72c05dfba1ce6a55f7a4
-
SSDEEP
1536:1P8h47EAVJEiw1TNDEPE7WMTxdLjfPz+MkwaymTB4Md9ykj:ymgAVSxNl7WIxlj3z+M9/md4qj
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20240226-en
Malware Config
Extracted
https://case.gonukkad.com/sys-cache/CjT/
https://starrcoin.net/wp-admin/YT/
http://modelaw.devkind.com.au/wp-admin/cvDRmGK/
http://dprkp.palembang.go.id/sys-cache/7Y4aHw/
http://completeguideblogging.com/euiot/PAuJG/
http://qutiche.cn/wp-admin/Q/
https://shiva-engineering.com/1cj/tKemHV7/
Targets
-
-
Target
sample
-
Size
157KB
-
MD5
07541823190d022e1a1136ded8f06fa3
-
SHA1
83c4da7f699f80abb815c25677585e891a60a1ff
-
SHA256
9125706ef9bf6b56ee381a86a48c2c6db5aca9a2ccf49ec1ccb2682c3257966b
-
SHA512
d5547163c074e986efe32b9f7d071769dcdebf2a532f22b36df66a5e96bb4c1b7611d82bfe505990dddc48e48a3bebe36aac911a84fd3070d7651af7115ddf5e
-
SSDEEP
1536:A2Fj72Fjmrdi1Ir77zOH98Wj2gpngh+a99lJiMV:1rfrzOH98ipgbYMV
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-