General
-
Target
e0092807436ce2e161a913c832a838bb_JaffaCakes118
-
Size
221KB
-
Sample
240914-mxsrcszelk
-
MD5
e0092807436ce2e161a913c832a838bb
-
SHA1
b1a1c53a926d41c59c0f0ddd39b77fbb21d20072
-
SHA256
20febcf811bc6dc138f78697d9678bc6fd9fcf1dd34f70904f76032e4b56d73d
-
SHA512
36845757c456424237d43746c5a2ee2a0525f323f9d3bfc704244f1a7739c89f071020939a90fa01a449d8a87789dc1ef6d2966306f8821b6fcddeb914da6201
-
SSDEEP
3072:b4tcTvjvTY140818tIP4ovpPSGju9jDW1M+75p3i:EtcnvE140o8tIP4apYjDjmHi
Behavioral task
behavioral1
Sample
e0092807436ce2e161a913c832a838bb_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0092807436ce2e161a913c832a838bb_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://hottco.com/stats/erd/
http://dutarini.com/cgi-bin/6/
https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/
http://pastaciyiz.biz/wp-includes/fvx/
https://dogaltrm.com/components/r6h/
https://dortislem.net/administrator/c/
https://onyourleftracing.com/cgi-bin/QcC/
Targets
-
-
Target
e0092807436ce2e161a913c832a838bb_JaffaCakes118
-
Size
221KB
-
MD5
e0092807436ce2e161a913c832a838bb
-
SHA1
b1a1c53a926d41c59c0f0ddd39b77fbb21d20072
-
SHA256
20febcf811bc6dc138f78697d9678bc6fd9fcf1dd34f70904f76032e4b56d73d
-
SHA512
36845757c456424237d43746c5a2ee2a0525f323f9d3bfc704244f1a7739c89f071020939a90fa01a449d8a87789dc1ef6d2966306f8821b6fcddeb914da6201
-
SSDEEP
3072:b4tcTvjvTY140818tIP4ovpPSGju9jDW1M+75p3i:EtcnvE140o8tIP4apYjDjmHi
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-