General

  • Target

    43d639a0906d7ffc411e546f20cc8340_JaffaCakes118

  • Size

    885KB

  • Sample

    240515-a5nfdsgg5z

  • MD5

    43d639a0906d7ffc411e546f20cc8340

  • SHA1

    fb2035371453531924da481ad2d096e2aff10905

  • SHA256

    7741ec045781e5b7cb1c6a6b46788f7940b3539595334a939afbeb6e61919de8

  • SHA512

    7998e69e7cf455f8fc26a71a30bc2a987f9398583c6ac7a40bee8a6db49922885d2b9d72513592532489657889c84e8bedea8ac67b3cc551ec59d3af57fe7809

  • SSDEEP

    24576:huvYVsT1lnTPopmmyBgCl3T0lVz6odQ6R:0vYkRTE3YcbQO

Score
7/10

Malware Config

Targets

    • Target

      43d639a0906d7ffc411e546f20cc8340_JaffaCakes118

    • Size

      885KB

    • MD5

      43d639a0906d7ffc411e546f20cc8340

    • SHA1

      fb2035371453531924da481ad2d096e2aff10905

    • SHA256

      7741ec045781e5b7cb1c6a6b46788f7940b3539595334a939afbeb6e61919de8

    • SHA512

      7998e69e7cf455f8fc26a71a30bc2a987f9398583c6ac7a40bee8a6db49922885d2b9d72513592532489657889c84e8bedea8ac67b3cc551ec59d3af57fe7809

    • SSDEEP

      24576:huvYVsT1lnTPopmmyBgCl3T0lVz6odQ6R:0vYkRTE3YcbQO

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks