General

  • Target

    97b8c37e8df6ea660fbed08c06ad62f4_JaffaCakes118

  • Size

    80KB

  • Sample

    240605-ladhgsbg2x

  • MD5

    97b8c37e8df6ea660fbed08c06ad62f4

  • SHA1

    2744eb4b32281116c7f0837b4a3c965d0139dfa3

  • SHA256

    2f3c0251d9c980c8439b488e529b0450c5ef5526442ba3fb332258ac9132858b

  • SHA512

    6d017bf5d8a188cd849786d648eac335d86f7dbc6061edd33652139c25b9ef8f18162311dd069524f84a46a042bf884b4a418fa9579fe8fe38efc31f2746e6c1

  • SSDEEP

    1536:Ru4r7ljmW9/bvFM+a9oDU3zp78KlyPh9shU3:Ru4nl/bvFQpaPh9shU3

Score
10/10

Malware Config

Targets

    • Target

      97b8c37e8df6ea660fbed08c06ad62f4_JaffaCakes118

    • Size

      80KB

    • MD5

      97b8c37e8df6ea660fbed08c06ad62f4

    • SHA1

      2744eb4b32281116c7f0837b4a3c965d0139dfa3

    • SHA256

      2f3c0251d9c980c8439b488e529b0450c5ef5526442ba3fb332258ac9132858b

    • SHA512

      6d017bf5d8a188cd849786d648eac335d86f7dbc6061edd33652139c25b9ef8f18162311dd069524f84a46a042bf884b4a418fa9579fe8fe38efc31f2746e6c1

    • SSDEEP

      1536:Ru4r7ljmW9/bvFM+a9oDU3zp78KlyPh9shU3:Ru4nl/bvFQpaPh9shU3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks