General

  • Target

    6fbdd3e1ed1ae536e56795b7a29f4a03_JaffaCakes118

  • Size

    114KB

  • Sample

    241023-tdx1asycnf

  • MD5

    6fbdd3e1ed1ae536e56795b7a29f4a03

  • SHA1

    e5ce39c376ae4b56b984e02eab0ba816e720974f

  • SHA256

    b1feb877091de7679fafd8e534101267393f75a4a1037551c6d6d25c92567438

  • SHA512

    fd5af02b5dd2c497c27574dc5bd23411e9a2ad8441b8c90d7aee4efb346291ab37f25d3aaabe71926cbe9fd6e32aca377a9651a334cca2629b85c66b08876716

  • SSDEEP

    3072:HVMqiH0id1KBWXDxstDTAkWVbrzYE7ITk9ujhJtXw65kwU:HVMqQc3VT

Malware Config

Targets

    • Target

      6fbdd3e1ed1ae536e56795b7a29f4a03_JaffaCakes118

    • Size

      114KB

    • MD5

      6fbdd3e1ed1ae536e56795b7a29f4a03

    • SHA1

      e5ce39c376ae4b56b984e02eab0ba816e720974f

    • SHA256

      b1feb877091de7679fafd8e534101267393f75a4a1037551c6d6d25c92567438

    • SHA512

      fd5af02b5dd2c497c27574dc5bd23411e9a2ad8441b8c90d7aee4efb346291ab37f25d3aaabe71926cbe9fd6e32aca377a9651a334cca2629b85c66b08876716

    • SSDEEP

      3072:HVMqiH0id1KBWXDxstDTAkWVbrzYE7ITk9ujhJtXw65kwU:HVMqQc3VT

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks