General

  • Target

    fba40d4a969cdd112bd1d5ec668b5ab3_JaffaCakes118

  • Size

    234KB

  • Sample

    240928-gntpeazfrj

  • MD5

    fba40d4a969cdd112bd1d5ec668b5ab3

  • SHA1

    4af3e6cf227059257852eb88d7a4570e58be6a8c

  • SHA256

    7e92c6d43dc46e86975e6f04aa6079f82a3d9d6fb724c06fac8084581e408ab6

  • SHA512

    ddbd548242a7daff7681d95e0569bc70b82471ea2230f23588539b766f995a8cdff2b314bd41d33aaab217747c782db511edb969ddcd7e3cbf72d7dbf5893e7b

  • SSDEEP

    6144:14q/fsAYL6GzTmVLKql1KHCP4G3Ks0TXSqaz+/:WGUAYL6GzTmVLCigG6sSC7+

Malware Config

Targets

    • Target

      fba40d4a969cdd112bd1d5ec668b5ab3_JaffaCakes118

    • Size

      234KB

    • MD5

      fba40d4a969cdd112bd1d5ec668b5ab3

    • SHA1

      4af3e6cf227059257852eb88d7a4570e58be6a8c

    • SHA256

      7e92c6d43dc46e86975e6f04aa6079f82a3d9d6fb724c06fac8084581e408ab6

    • SHA512

      ddbd548242a7daff7681d95e0569bc70b82471ea2230f23588539b766f995a8cdff2b314bd41d33aaab217747c782db511edb969ddcd7e3cbf72d7dbf5893e7b

    • SSDEEP

      6144:14q/fsAYL6GzTmVLKql1KHCP4G3Ks0TXSqaz+/:WGUAYL6GzTmVLCigG6sSC7+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks