General

  • Target

    ca06e01ffb4c9a6d0868e958b2a29858_JaffaCakes118

  • Size

    49KB

  • Sample

    240830-cdy4xstbrj

  • MD5

    ca06e01ffb4c9a6d0868e958b2a29858

  • SHA1

    eed7d47da955c4150089180355bf6723bc527e8a

  • SHA256

    6d4ea2569fa09f6d9d64286668f41742029536b00f29dd8916f5043e4572a7c6

  • SHA512

    98f675762ac8eec9dea6618f5d2c21b97938068a34295620540d7af18f16d1c0ec19e3e2dee66278d7db4b3d6fb811415b1533a84480ae6ccd57d98f6a85dbb2

  • SSDEEP

    1536:YTvX/7uDphYHceXVhca+fMHLtyeGxcl8/dgeD6yzsF6BCKG6GJ+Qv:G/7uDphYHceXVhca+fMHLtyeGxcl8/dI

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://matterandhome.com/twtao/222222.png

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://matterandhome.com/twtao/222222.png

Targets

    • Target

      ca06e01ffb4c9a6d0868e958b2a29858_JaffaCakes118

    • Size

      49KB

    • MD5

      ca06e01ffb4c9a6d0868e958b2a29858

    • SHA1

      eed7d47da955c4150089180355bf6723bc527e8a

    • SHA256

      6d4ea2569fa09f6d9d64286668f41742029536b00f29dd8916f5043e4572a7c6

    • SHA512

      98f675762ac8eec9dea6618f5d2c21b97938068a34295620540d7af18f16d1c0ec19e3e2dee66278d7db4b3d6fb811415b1533a84480ae6ccd57d98f6a85dbb2

    • SSDEEP

      1536:YTvX/7uDphYHceXVhca+fMHLtyeGxcl8/dgeD6yzsF6BCKG6GJ+Qv:G/7uDphYHceXVhca+fMHLtyeGxcl8/dI

    Score
    10/10
    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Enterprise v15

Tasks