General

  • Target

    da703521ac8879dc7d6bb4ed91e2ee0d_JaffaCakes118

  • Size

    58KB

  • Sample

    240911-qn4n2sshqb

  • MD5

    da703521ac8879dc7d6bb4ed91e2ee0d

  • SHA1

    9266aac47f8926953b960096ac53aa12fccd8788

  • SHA256

    8701bac8488c56fb1ee4177cd41bbc54dda261e31edf98e7058957621dd5f291

  • SHA512

    caf48b3f7bea274b6160abfc4eee4eddfc6cc72093d85c0b1d14f5f52a237a1d2f186e57f28d6b363397b7bec2663b8719b587ba7df6d8099290f47d1b770542

  • SSDEEP

    1536:Oihz0DewjEXWfCDIM/V5xtezEsi8OUM+tfNaIZEpqpXoud:Oihz0DewjEXWfCDIM/V5xtezEsi8OUM0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.psicheaurora.it/fanta/download.php

Targets

    • Target

      da703521ac8879dc7d6bb4ed91e2ee0d_JaffaCakes118

    • Size

      58KB

    • MD5

      da703521ac8879dc7d6bb4ed91e2ee0d

    • SHA1

      9266aac47f8926953b960096ac53aa12fccd8788

    • SHA256

      8701bac8488c56fb1ee4177cd41bbc54dda261e31edf98e7058957621dd5f291

    • SHA512

      caf48b3f7bea274b6160abfc4eee4eddfc6cc72093d85c0b1d14f5f52a237a1d2f186e57f28d6b363397b7bec2663b8719b587ba7df6d8099290f47d1b770542

    • SSDEEP

      1536:Oihz0DewjEXWfCDIM/V5xtezEsi8OUM+tfNaIZEpqpXoud:Oihz0DewjEXWfCDIM/V5xtezEsi8OUM0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks