General
-
Target
9c9fb36aab136e4bf6d52942b3847589_JaffaCakes118
-
Size
8KB
-
Sample
240611-b619bazapf
-
MD5
9c9fb36aab136e4bf6d52942b3847589
-
SHA1
492ab3a590411956cad48c7f84781ae47698aaa7
-
SHA256
2de0dadac54fcdde57770c596f3ae4975e3936b40acd35cf23b9ac6727e0b51b
-
SHA512
3bb35faf4db85f7cd9ad855757a4e88b4ef9f3f28c8a07607ad53ce78fe3ddb171a55a32957cc0f2484d3282fc3707ce33d4ad52b02e56ee697d772a1a799632
-
SSDEEP
192:rBMOo7eYpLzxMQqegxGdd8ieMJS0erpXnFSKyMnW5bes2N/s+8py0:VM7eYpLzxMPzxab/erpXoKyM3NDH0
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT Transfer MT103.docx
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SWIFT Transfer MT103.docx
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
SWIFT Transfer MT103.docx
-
Size
9KB
-
MD5
9c5c3fe57b90731b2edd19ffef40c114
-
SHA1
56b601d50b943d8ab4d0cd7a70ba3126c83f1611
-
SHA256
0c56b70fdb81c54cca777e7225783ccf71986a796b0b10521d048e48a694be01
-
SHA512
5f511a26e15b3bf7566a5306e2658381534efc459c675947f006ad706db857a39fda3de66cf243c4b0d0487a07d21fd066b905407f04ac56bb9f42cfd319aec7
-
SSDEEP
192:G0cSPQt7WOF1MyMtWNhYVk0mqQTnhr5OhCQT1QSYP55h4OybFTB8GoA6ajzokWS3:rjPMlQyMtiq4LOoQT1QXD+xdcgmS
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-