General
-
Target
eed652a394cfa0bf878eb4f339afab5c_JaffaCakes118
-
Size
200KB
-
Sample
240921-b5ph5azbnr
-
MD5
eed652a394cfa0bf878eb4f339afab5c
-
SHA1
bd65ee68bf93e5034792bed09aa5be126bcee540
-
SHA256
5dcb15c147742a5321da1d0fbfa30d0d037ec424a6fdf5661ab94e54fda59acb
-
SHA512
baa66cab34764366d82f25884551d028ff1ae2a9a7d5b1c745c040848607e6dde3f809da44f526751bced13146d2740626df29f8f3a22fe81f70692f74a2435a
-
SSDEEP
6144:XgULVG5HGJG1VqDTQpzAiXajJ7qxPmdvm:XtG0IbzvX2qxA
Behavioral task
behavioral1
Sample
eed652a394cfa0bf878eb4f339afab5c_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eed652a394cfa0bf878eb4f339afab5c_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://hawkinscs.com/uBmDMGkJ
http://hydrocarbonreports.com/0
http://grupovisionpr.com/GJjBPh
http://ajx3.com/akDJlHl
http://kazak.zendo.in.ua/7G4P
Targets
-
-
Target
eed652a394cfa0bf878eb4f339afab5c_JaffaCakes118
-
Size
200KB
-
MD5
eed652a394cfa0bf878eb4f339afab5c
-
SHA1
bd65ee68bf93e5034792bed09aa5be126bcee540
-
SHA256
5dcb15c147742a5321da1d0fbfa30d0d037ec424a6fdf5661ab94e54fda59acb
-
SHA512
baa66cab34764366d82f25884551d028ff1ae2a9a7d5b1c745c040848607e6dde3f809da44f526751bced13146d2740626df29f8f3a22fe81f70692f74a2435a
-
SSDEEP
6144:XgULVG5HGJG1VqDTQpzAiXajJ7qxPmdvm:XtG0IbzvX2qxA
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-