General

  • Target

    183e8c64a62fd2b191020582f600c6e0_JaffaCakes118

  • Size

    57KB

  • Sample

    240628-bk7tzavgpj

  • MD5

    183e8c64a62fd2b191020582f600c6e0

  • SHA1

    92d38d474e66032933b80f1061c5433d96d593eb

  • SHA256

    e31639872d99773ca6a3191b458569712a471e8078a49ee2f8fb57e1fbd8c0a3

  • SHA512

    dc045f3cfe2011eca0e821784d982f4a0e623ef46f56133d36e9ec4a00cd8794c03435aa4cee72266d0e0529a9a304e4bbd776b46824f5d12bde47b7cddf4378

  • SSDEEP

    1536:v9a+osleo1o2qE/kGG7iuy/1KZBV66WpOY/5Jp/WW:Vvo27Nvuy/1Kh66WpOY

Score
7/10
upx

Malware Config

Targets

    • Target

      183e8c64a62fd2b191020582f600c6e0_JaffaCakes118

    • Size

      57KB

    • MD5

      183e8c64a62fd2b191020582f600c6e0

    • SHA1

      92d38d474e66032933b80f1061c5433d96d593eb

    • SHA256

      e31639872d99773ca6a3191b458569712a471e8078a49ee2f8fb57e1fbd8c0a3

    • SHA512

      dc045f3cfe2011eca0e821784d982f4a0e623ef46f56133d36e9ec4a00cd8794c03435aa4cee72266d0e0529a9a304e4bbd776b46824f5d12bde47b7cddf4378

    • SSDEEP

      1536:v9a+osleo1o2qE/kGG7iuy/1KZBV66WpOY/5Jp/WW:Vvo27Nvuy/1Kh66WpOY

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks