General

  • Target

    9c9fb36aab136e4bf6d52942b3847589_JaffaCakes118

  • Size

    8KB

  • Sample

    240611-b619bazapf

  • MD5

    9c9fb36aab136e4bf6d52942b3847589

  • SHA1

    492ab3a590411956cad48c7f84781ae47698aaa7

  • SHA256

    2de0dadac54fcdde57770c596f3ae4975e3936b40acd35cf23b9ac6727e0b51b

  • SHA512

    3bb35faf4db85f7cd9ad855757a4e88b4ef9f3f28c8a07607ad53ce78fe3ddb171a55a32957cc0f2484d3282fc3707ce33d4ad52b02e56ee697d772a1a799632

  • SSDEEP

    192:rBMOo7eYpLzxMQqegxGdd8ieMJS0erpXnFSKyMnW5bes2N/s+8py0:VM7eYpLzxMPzxab/erpXoKyM3NDH0

Score
10/10

Malware Config

Targets

    • Target

      SWIFT Transfer MT103.docx

    • Size

      9KB

    • MD5

      9c5c3fe57b90731b2edd19ffef40c114

    • SHA1

      56b601d50b943d8ab4d0cd7a70ba3126c83f1611

    • SHA256

      0c56b70fdb81c54cca777e7225783ccf71986a796b0b10521d048e48a694be01

    • SHA512

      5f511a26e15b3bf7566a5306e2658381534efc459c675947f006ad706db857a39fda3de66cf243c4b0d0487a07d21fd066b905407f04ac56bb9f42cfd319aec7

    • SSDEEP

      192:G0cSPQt7WOF1MyMtWNhYVk0mqQTnhr5OhCQT1QSYP55h4OybFTB8GoA6ajzokWS3:rjPMlQyMtiq4LOoQT1QXD+xdcgmS

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks