General

  • Target

    0269542c082ddee6ec9fa0c79d9d4c08_JaffaCakes118

  • Size

    257KB

  • Sample

    240620-dzywqa1anp

  • MD5

    0269542c082ddee6ec9fa0c79d9d4c08

  • SHA1

    7cc4ae98f870fed715ab5fc281409b08ce198b8a

  • SHA256

    e11c5e9dcc87e61b8029546b19276cfa58b9d22c558527a1fca46e06eb8a4508

  • SHA512

    0a39f2c75404ffe61240c8031cd7f89cb7f194ac5c21395aa7248789badbb2adb48cd0e4fd4f3c90f9751b5abf7f63bbaefb3396e9cd3a68c6f5710599ba9b68

  • SSDEEP

    6144:vlH5bK8puGlwpOr+M8xGVGKbQS6Hd2/rgwjElrX5QF4s7FGq:vNqGlw8r+/xjK0SA1Rp5ls7FV

Score
7/10
upx

Malware Config

Targets

    • Target

      0269542c082ddee6ec9fa0c79d9d4c08_JaffaCakes118

    • Size

      257KB

    • MD5

      0269542c082ddee6ec9fa0c79d9d4c08

    • SHA1

      7cc4ae98f870fed715ab5fc281409b08ce198b8a

    • SHA256

      e11c5e9dcc87e61b8029546b19276cfa58b9d22c558527a1fca46e06eb8a4508

    • SHA512

      0a39f2c75404ffe61240c8031cd7f89cb7f194ac5c21395aa7248789badbb2adb48cd0e4fd4f3c90f9751b5abf7f63bbaefb3396e9cd3a68c6f5710599ba9b68

    • SSDEEP

      6144:vlH5bK8puGlwpOr+M8xGVGKbQS6Hd2/rgwjElrX5QF4s7FGq:vNqGlw8r+/xjK0SA1Rp5ls7FV

    Score
    7/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks