General
-
Target
c88dd06b1f25fd0fc256ed2d874c6513_JaffaCakes118
-
Size
154KB
-
Sample
240829-lcla4swfjr
-
MD5
c88dd06b1f25fd0fc256ed2d874c6513
-
SHA1
06df3a61cf1ba9f801f0c0e37ea3bc5e11f6a47d
-
SHA256
496f28c45a056ece930233ef9c15f5e227d9939706d8ff9868f8928cfd600149
-
SHA512
b0770e2fe4ecb7adb61cbec8c82a18e6301718294b266ff5a09ec75cfe8c9719da169617efd0f7ca8ae9a176fa1e709e9bfb26deeee6b006c8fac5b4d52aef2d
-
SSDEEP
3072:WgIg4KfNmKdXKDAfCzDSrvFf9kIy1GOsc3Uv6K:WVqNVXKDACzDSrNU4OscEv
Behavioral task
behavioral1
Sample
c88dd06b1f25fd0fc256ed2d874c6513_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c88dd06b1f25fd0fc256ed2d874c6513_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://h-g.at/ILM7q/
http://ibchs.com/ah1B/
http://hillmanmaritime.com/hcBm/
http://body4art.de/v0tMR0a/
Targets
-
-
Target
c88dd06b1f25fd0fc256ed2d874c6513_JaffaCakes118
-
Size
154KB
-
MD5
c88dd06b1f25fd0fc256ed2d874c6513
-
SHA1
06df3a61cf1ba9f801f0c0e37ea3bc5e11f6a47d
-
SHA256
496f28c45a056ece930233ef9c15f5e227d9939706d8ff9868f8928cfd600149
-
SHA512
b0770e2fe4ecb7adb61cbec8c82a18e6301718294b266ff5a09ec75cfe8c9719da169617efd0f7ca8ae9a176fa1e709e9bfb26deeee6b006c8fac5b4d52aef2d
-
SSDEEP
3072:WgIg4KfNmKdXKDAfCzDSrvFf9kIy1GOsc3Uv6K:WVqNVXKDACzDSrNU4OscEv
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-