General

  • Target

    a47e362532593ec02ef1de05e275ab9e_JaffaCakes118

  • Size

    919KB

  • Sample

    240613-jne75ateqr

  • MD5

    a47e362532593ec02ef1de05e275ab9e

  • SHA1

    09b233da980c11a67394fa5cb324d2598bc2d80f

  • SHA256

    8a8fdabc5fcfc80341bf3a0b0356aecddaab4cefe2cf76209b98131f2012b0b5

  • SHA512

    461d8fbfada5419e692d76b89d64e14b0687d18af479f81e0a0c52241f1605e51f2449eac885329510586af80be4e22aed1252412e36f3a1352a314e4ec276c2

  • SSDEEP

    24576:O2chXEgYJoRNNTQQ1ldiVTzqiCZ+8Pg5Bh:O2c4onl5epzqiCRPg5Bh

Score
7/10
upx

Malware Config

Targets

    • Target

      a47e362532593ec02ef1de05e275ab9e_JaffaCakes118

    • Size

      919KB

    • MD5

      a47e362532593ec02ef1de05e275ab9e

    • SHA1

      09b233da980c11a67394fa5cb324d2598bc2d80f

    • SHA256

      8a8fdabc5fcfc80341bf3a0b0356aecddaab4cefe2cf76209b98131f2012b0b5

    • SHA512

      461d8fbfada5419e692d76b89d64e14b0687d18af479f81e0a0c52241f1605e51f2449eac885329510586af80be4e22aed1252412e36f3a1352a314e4ec276c2

    • SSDEEP

      24576:O2chXEgYJoRNNTQQ1ldiVTzqiCZ+8Pg5Bh:O2c4onl5epzqiCRPg5Bh

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks