General

  • Target

    16c71b556f6acea038c2c043c99909a2_JaffaCakes118

  • Size

    434KB

  • Sample

    240627-vhjh5s1bla

  • MD5

    16c71b556f6acea038c2c043c99909a2

  • SHA1

    0d366eae661cd5fcf83880bb3e7523134d965f95

  • SHA256

    50ed9de5ba4828584dcc478620835fae40345a277ca62ebf6387e4a3f6942097

  • SHA512

    3b8937c907667bbd736d73acc66d39207b870c702a2599667c586ab10a179c3fa6266351c493778f98522f10678af45e0598da434394b8399cbbe1e7792a3b53

  • SSDEEP

    12288:rXPcLcbGfVylwG/ZDCK/ScBXo8TsyMkKMY8m7WOK95OTTsx/SA/WegYfdNbrqnuW:rXh6XcBXo8TsL8Y8m4OTTySA/DrfdNbs

Score
10/10

Malware Config

Targets

    • Target

      16c71b556f6acea038c2c043c99909a2_JaffaCakes118

    • Size

      434KB

    • MD5

      16c71b556f6acea038c2c043c99909a2

    • SHA1

      0d366eae661cd5fcf83880bb3e7523134d965f95

    • SHA256

      50ed9de5ba4828584dcc478620835fae40345a277ca62ebf6387e4a3f6942097

    • SHA512

      3b8937c907667bbd736d73acc66d39207b870c702a2599667c586ab10a179c3fa6266351c493778f98522f10678af45e0598da434394b8399cbbe1e7792a3b53

    • SSDEEP

      12288:rXPcLcbGfVylwG/ZDCK/ScBXo8TsyMkKMY8m7WOK95OTTsx/SA/WegYfdNbrqnuW:rXh6XcBXo8TsL8Y8m4OTTySA/DrfdNbs

    Score
    10/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Uses Tor communications

      Malware can proxy its traffic through Tor for more anonymity.

MITRE ATT&CK Matrix ATT&CK v13

Tasks