General

  • Target

    07b4d2104d122af57166d68c09b6f388_JaffaCakes118

  • Size

    457KB

  • Sample

    240620-tweaxa1cnm

  • MD5

    07b4d2104d122af57166d68c09b6f388

  • SHA1

    f1527e27a6d84c0722824b75ca3c7ee479111a3d

  • SHA256

    d32c5460431acbe93cd5174561b95ebb82eb29936542bee3f5c28d9cd8616cc6

  • SHA512

    491788e02a8b8ada70d27937b3a5fb35458062fe01404d78cf6b356f8cbb0126c514ae29570ba10a9a0773b10e4a1f3b874ec082c882f755a8a93145e8b5a03f

  • SSDEEP

    12288:MA7oPGWsldZ0xpdKHA6oeqHBQ4p/RNGzra1K/UfCIi20:TouWsFWOglLHj9RIra1dfCII

Malware Config

Targets

    • Target

      07b4d2104d122af57166d68c09b6f388_JaffaCakes118

    • Size

      457KB

    • MD5

      07b4d2104d122af57166d68c09b6f388

    • SHA1

      f1527e27a6d84c0722824b75ca3c7ee479111a3d

    • SHA256

      d32c5460431acbe93cd5174561b95ebb82eb29936542bee3f5c28d9cd8616cc6

    • SHA512

      491788e02a8b8ada70d27937b3a5fb35458062fe01404d78cf6b356f8cbb0126c514ae29570ba10a9a0773b10e4a1f3b874ec082c882f755a8a93145e8b5a03f

    • SSDEEP

      12288:MA7oPGWsldZ0xpdKHA6oeqHBQ4p/RNGzra1K/UfCIi20:TouWsFWOglLHj9RIra1dfCII

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks