General

  • Target

    2f6a1a6804e0152183975d771745ecf2_JaffaCakes118

  • Size

    588KB

  • Sample

    240510-q3xt2scf75

  • MD5

    2f6a1a6804e0152183975d771745ecf2

  • SHA1

    645dcbd2238cad8957f11a895e516990f89abf0a

  • SHA256

    6c05ab7870d608d7510ef3850a9f58c70fd8ca63ff76358e7bb9e559b4f91b90

  • SHA512

    40416c9cd45733c3d62ab0a4e259c6283916d2fbdb66ae39c9fe7f3386c12c79138c5de636941807d3d4357ee3af3af764161dfa9246d0c151423ede25c3944d

  • SSDEEP

    12288:mXznQ+bCxWrUhLZvzC/igEhrNA9SNwyrYAmyhIna3PiGpYh7j:XgIh0/iLhrekeKYAl4RN

Score
7/10

Malware Config

Targets

    • Target

      2f6a1a6804e0152183975d771745ecf2_JaffaCakes118

    • Size

      588KB

    • MD5

      2f6a1a6804e0152183975d771745ecf2

    • SHA1

      645dcbd2238cad8957f11a895e516990f89abf0a

    • SHA256

      6c05ab7870d608d7510ef3850a9f58c70fd8ca63ff76358e7bb9e559b4f91b90

    • SHA512

      40416c9cd45733c3d62ab0a4e259c6283916d2fbdb66ae39c9fe7f3386c12c79138c5de636941807d3d4357ee3af3af764161dfa9246d0c151423ede25c3944d

    • SSDEEP

      12288:mXznQ+bCxWrUhLZvzC/igEhrNA9SNwyrYAmyhIna3PiGpYh7j:XgIh0/iLhrekeKYAl4RN

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks