General

  • Target

    db5bd9950f2363e0621b32cfc683c07f_JaffaCakes118

  • Size

    259KB

  • Sample

    241209-y3b7cazldy

  • MD5

    db5bd9950f2363e0621b32cfc683c07f

  • SHA1

    d04d53792f018fc754ed113438531b56b9433be3

  • SHA256

    fc519e674d968685aef5c562eb84b1066f121d55108a4a1f2e74a5274eb3779c

  • SHA512

    3c9e72756488d21fe7a626ec5d4c2720f28b8038988a8693b01f568abddd54c1a26426f52ab68f4332a5fc9d508039f172fec331ac3e76bdbc322a7be75e7dd1

  • SSDEEP

    6144:6FUjl6Nc7yRzs1H75wkZUgsRQ6UHXtD+Iv50ArEMUih0e36UA6S:W

Malware Config

Targets

    • Target

      db5bd9950f2363e0621b32cfc683c07f_JaffaCakes118

    • Size

      259KB

    • MD5

      db5bd9950f2363e0621b32cfc683c07f

    • SHA1

      d04d53792f018fc754ed113438531b56b9433be3

    • SHA256

      fc519e674d968685aef5c562eb84b1066f121d55108a4a1f2e74a5274eb3779c

    • SHA512

      3c9e72756488d21fe7a626ec5d4c2720f28b8038988a8693b01f568abddd54c1a26426f52ab68f4332a5fc9d508039f172fec331ac3e76bdbc322a7be75e7dd1

    • SSDEEP

      6144:6FUjl6Nc7yRzs1H75wkZUgsRQ6UHXtD+Iv50ArEMUih0e36UA6S:W

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks