General

  • Target

    6d50759f497de139d814c5317ac1a7b2_JaffaCakes118

  • Size

    180KB

  • Sample

    240524-exnteada2y

  • MD5

    6d50759f497de139d814c5317ac1a7b2

  • SHA1

    fef8f9ba145b05cd4463ec24f752a6a542254a4e

  • SHA256

    c4c8f638610072141c82ead9de72bdf91319833fa395957ccf439af5505c37d3

  • SHA512

    d53e11df7b09dc6eba2e8c6d9337c362a62ccaba643791ccb677e9666482119d7ce3540bbed5687e435253bf703d0e15acb770b4c9324f754a57984f6784e343

  • SSDEEP

    3072:JCOFXlZ+NXRmIu/UiY80kiaa+H9jjOtALuOioZAyQW67s:RF1Z+NBnu/Ui9ieO+L

Score
7/10

Malware Config

Targets

    • Target

      6d50759f497de139d814c5317ac1a7b2_JaffaCakes118

    • Size

      180KB

    • MD5

      6d50759f497de139d814c5317ac1a7b2

    • SHA1

      fef8f9ba145b05cd4463ec24f752a6a542254a4e

    • SHA256

      c4c8f638610072141c82ead9de72bdf91319833fa395957ccf439af5505c37d3

    • SHA512

      d53e11df7b09dc6eba2e8c6d9337c362a62ccaba643791ccb677e9666482119d7ce3540bbed5687e435253bf703d0e15acb770b4c9324f754a57984f6784e343

    • SSDEEP

      3072:JCOFXlZ+NXRmIu/UiY80kiaa+H9jjOtALuOioZAyQW67s:RF1Z+NBnu/Ui9ieO+L

    Score
    7/10
    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks