General

  • Target

    10835bbaba51e62af438366f2128e5f5_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240503-pl343agc83

  • MD5

    10835bbaba51e62af438366f2128e5f5

  • SHA1

    0763eb8bfb1439878c4c02ce4e950c07275ebf02

  • SHA256

    4195ef696648e960bcd28f15347ed3c6454b8dec1bbe5adc54c9a341c1070e89

  • SHA512

    d37cd3e3f80ca2525aadf73b964331109ae7b9aca4997b946fa83aaff8a1a9622ea8d59644f81ef36ae59ef848d9dfc327ffcfea15c3d97edfa3985d34487aa3

  • SSDEEP

    24576:ndHDcq47d/mF6dxhXwsnfPf+5+XP0WF0ncXr4r/UjZLjkr12JzQf/jpYzQcwwKs4:9

Malware Config

Targets

    • Target

      10835bbaba51e62af438366f2128e5f5_JaffaCakes118

    • Size

      1.3MB

    • MD5

      10835bbaba51e62af438366f2128e5f5

    • SHA1

      0763eb8bfb1439878c4c02ce4e950c07275ebf02

    • SHA256

      4195ef696648e960bcd28f15347ed3c6454b8dec1bbe5adc54c9a341c1070e89

    • SHA512

      d37cd3e3f80ca2525aadf73b964331109ae7b9aca4997b946fa83aaff8a1a9622ea8d59644f81ef36ae59ef848d9dfc327ffcfea15c3d97edfa3985d34487aa3

    • SSDEEP

      24576:ndHDcq47d/mF6dxhXwsnfPf+5+XP0WF0ncXr4r/UjZLjkr12JzQf/jpYzQcwwKs4:9

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks