General

  • Target

    ecd92cad50a5ba75e2bcb6a1c600cb2c_JaffaCakes118

  • Size

    167KB

  • Sample

    240920-e6yd7syeka

  • MD5

    ecd92cad50a5ba75e2bcb6a1c600cb2c

  • SHA1

    4952c5e01a73f3b8510cdb8eb414a3d49da710f9

  • SHA256

    eec88dd278b058c921e1bf1ae65d230760911755273b0078df377289c67ee94e

  • SHA512

    031d271a6509d9dfe72d165cb7fc26fe961b7083416847ed5fd5954e586de9f1241123660b157ab28ee3c8d56a22527377c76eae773ce6defec33b98711c03cf

  • SSDEEP

    3072:RdgaE5eDjYzq8y/YA6FBspfrnxaExZwzDh7yfBpbX:Rd9DjSq5/YA6FudrnxdaDh7oBt

Malware Config

Targets

    • Target

      ecd92cad50a5ba75e2bcb6a1c600cb2c_JaffaCakes118

    • Size

      167KB

    • MD5

      ecd92cad50a5ba75e2bcb6a1c600cb2c

    • SHA1

      4952c5e01a73f3b8510cdb8eb414a3d49da710f9

    • SHA256

      eec88dd278b058c921e1bf1ae65d230760911755273b0078df377289c67ee94e

    • SHA512

      031d271a6509d9dfe72d165cb7fc26fe961b7083416847ed5fd5954e586de9f1241123660b157ab28ee3c8d56a22527377c76eae773ce6defec33b98711c03cf

    • SSDEEP

      3072:RdgaE5eDjYzq8y/YA6FBspfrnxaExZwzDh7yfBpbX:Rd9DjSq5/YA6FudrnxdaDh7oBt

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks