General

  • Target

    fecaaf76466c6c481dc4510c41b37caa_JaffaCakes118

  • Size

    246KB

  • Sample

    240421-jl6bjaeg5t

  • MD5

    fecaaf76466c6c481dc4510c41b37caa

  • SHA1

    ed76573e6c533448709166b8978d34979456c2ac

  • SHA256

    97c7d17e68b8ff3a3d63f40362d96fa776240f9fc1f590a4f67ac2e5b1c7816f

  • SHA512

    2d834c8870ecbf1f3f78536e5c6cc143a3bcd2ad82c31d3fc5ae5593aea227d8b8046c8aa78563e2ede306d1d77a32921c0ee72c2374023fa1ad4e3d68d26206

  • SSDEEP

    6144:qqjgsaxwH+Z0H0wJCk0vYuPk1y8jL3X9BAskEv3ilPe:1ZaGHhC5wfDjxOs73

Score
10/10

Malware Config

Targets

    • Target

      fecaaf76466c6c481dc4510c41b37caa_JaffaCakes118

    • Size

      246KB

    • MD5

      fecaaf76466c6c481dc4510c41b37caa

    • SHA1

      ed76573e6c533448709166b8978d34979456c2ac

    • SHA256

      97c7d17e68b8ff3a3d63f40362d96fa776240f9fc1f590a4f67ac2e5b1c7816f

    • SHA512

      2d834c8870ecbf1f3f78536e5c6cc143a3bcd2ad82c31d3fc5ae5593aea227d8b8046c8aa78563e2ede306d1d77a32921c0ee72c2374023fa1ad4e3d68d26206

    • SSDEEP

      6144:qqjgsaxwH+Z0H0wJCk0vYuPk1y8jL3X9BAskEv3ilPe:1ZaGHhC5wfDjxOs73

    Score
    10/10
    • Modifies WinLogon for persistence

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks