General

  • Target

    083835c8832ceff3f8b4dc7e96230c39_JaffaCakes118

  • Size

    129KB

  • Sample

    240624-nhjetashrr

  • MD5

    083835c8832ceff3f8b4dc7e96230c39

  • SHA1

    23587b4b6a755f1060d0a4ed35132277155c7252

  • SHA256

    f173a83ba77b60b5529e75671f9e3e37b3b42b638e5284cf256318bb67e72bfa

  • SHA512

    a8479e796963434145887092bf899334dcea3dc3edfddd602d06d3ea9e70457c4a47e06b9b544510886e458cb872cae8654621bf33225695795b8b92fa5228aa

  • SSDEEP

    1536:ai+Zx52HDaBX7VciNJqGpkpiomXHlsKAT3oAt5bBBnouy8Po+:abZX2H05AGpyiom1qoAt5VhoutPo+

Malware Config

Targets

    • Target

      083835c8832ceff3f8b4dc7e96230c39_JaffaCakes118

    • Size

      129KB

    • MD5

      083835c8832ceff3f8b4dc7e96230c39

    • SHA1

      23587b4b6a755f1060d0a4ed35132277155c7252

    • SHA256

      f173a83ba77b60b5529e75671f9e3e37b3b42b638e5284cf256318bb67e72bfa

    • SHA512

      a8479e796963434145887092bf899334dcea3dc3edfddd602d06d3ea9e70457c4a47e06b9b544510886e458cb872cae8654621bf33225695795b8b92fa5228aa

    • SSDEEP

      1536:ai+Zx52HDaBX7VciNJqGpkpiomXHlsKAT3oAt5bBBnouy8Po+:abZX2H05AGpyiom1qoAt5VhoutPo+

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks