General

  • Target

    9c61317ef24d1dfe5eb264c8a3ee9f0c_JaffaCakes118

  • Size

    4.7MB

  • Sample

    240611-aaql9swclg

  • MD5

    9c61317ef24d1dfe5eb264c8a3ee9f0c

  • SHA1

    27f8f8ea116e644be2e112cb5e9157b00db215cb

  • SHA256

    4bff80474f2c35b22c1bc4de64ae1d04390526656e20e4d3ab9c91ae6c713d65

  • SHA512

    d85f964b5983d74b9e15b620f4eb584744ff60d3b6a91f898f0c1f51aab742f0b9e065c713c1d98d453d6471014eb89575bb27ea7070b4c7a38b892675a572d9

  • SSDEEP

    98304:YXfkMf4uBFeJ1QleIDHgbAfmQtPUpNCp5DORqMtaUljVUPXnCkyVtFN1Mr:+vQuneJ1QLHavQSpNCPD8qMQUlq4tFNk

Score
7/10

Malware Config

Targets

    • Target

      9c61317ef24d1dfe5eb264c8a3ee9f0c_JaffaCakes118

    • Size

      4.7MB

    • MD5

      9c61317ef24d1dfe5eb264c8a3ee9f0c

    • SHA1

      27f8f8ea116e644be2e112cb5e9157b00db215cb

    • SHA256

      4bff80474f2c35b22c1bc4de64ae1d04390526656e20e4d3ab9c91ae6c713d65

    • SHA512

      d85f964b5983d74b9e15b620f4eb584744ff60d3b6a91f898f0c1f51aab742f0b9e065c713c1d98d453d6471014eb89575bb27ea7070b4c7a38b892675a572d9

    • SSDEEP

      98304:YXfkMf4uBFeJ1QleIDHgbAfmQtPUpNCp5DORqMtaUljVUPXnCkyVtFN1Mr:+vQuneJ1QLHavQSpNCPD8qMQUlq4tFNk

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks