General

  • Target

    1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118

  • Size

    128KB

  • Sample

    240701-qxkbrsyajm

  • MD5

    1b80613ac090d4eecfdd6554d4290b7b

  • SHA1

    52ee1d680eb6394897e5854027f2eadc76acba2e

  • SHA256

    f7f8376c3a4289f5ba02262cad0889c8f8572b0dac37226e37e71132a20ed825

  • SHA512

    c2399e167628b579addfea8250ea63475f70bafc51c2bca4d0bc4fe2d82e7623ac008e1121f805a3a082ca8d4db4286450cfe61abc7d7f43cb1c84a0bf834d95

  • SSDEEP

    3072:5zrl/nonoroxGDi73tCg3qilL42wA52jOMkrc0:5zrl/nonoroxGDFg3qilL42IjOPrD

Score
7/10

Malware Config

Targets

    • Target

      1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118

    • Size

      128KB

    • MD5

      1b80613ac090d4eecfdd6554d4290b7b

    • SHA1

      52ee1d680eb6394897e5854027f2eadc76acba2e

    • SHA256

      f7f8376c3a4289f5ba02262cad0889c8f8572b0dac37226e37e71132a20ed825

    • SHA512

      c2399e167628b579addfea8250ea63475f70bafc51c2bca4d0bc4fe2d82e7623ac008e1121f805a3a082ca8d4db4286450cfe61abc7d7f43cb1c84a0bf834d95

    • SSDEEP

      3072:5zrl/nonoroxGDi73tCg3qilL42wA52jOMkrc0:5zrl/nonoroxGDFg3qilL42IjOPrD

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks