General

  • Target

    e8a69d43cb32354bd852c5ab9c071abe_JaffaCakes118

  • Size

    84KB

  • Sample

    240918-jq6g4a1bjn

  • MD5

    e8a69d43cb32354bd852c5ab9c071abe

  • SHA1

    11c101fc170253637726e5d1117a86dd2a2d9401

  • SHA256

    51cd6bdb18da6dc94549e067b04e727b9e947f2f189f5c27da67eb56f77c5f54

  • SHA512

    796c5403741abeacc76247f52a872d2b11aba408493a16263a10a99d9fff9111c8a9610dfbd9ece011dc60bd922a453259487d60bbf0e2a0f2f9b45ed08d2900

  • SSDEEP

    1536:c5ocn1kp59gxBK85fBt+a9AgIsTy4Ceh:B41k/W48jIt4CW

Malware Config

Targets

    • Target

      e8a69d43cb32354bd852c5ab9c071abe_JaffaCakes118

    • Size

      84KB

    • MD5

      e8a69d43cb32354bd852c5ab9c071abe

    • SHA1

      11c101fc170253637726e5d1117a86dd2a2d9401

    • SHA256

      51cd6bdb18da6dc94549e067b04e727b9e947f2f189f5c27da67eb56f77c5f54

    • SHA512

      796c5403741abeacc76247f52a872d2b11aba408493a16263a10a99d9fff9111c8a9610dfbd9ece011dc60bd922a453259487d60bbf0e2a0f2f9b45ed08d2900

    • SSDEEP

      1536:c5ocn1kp59gxBK85fBt+a9AgIsTy4Ceh:B41k/W48jIt4CW

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks