General

  • Target

    1c6355c45e08c13646e47dafcb66690e_JaffaCakes118

  • Size

    536KB

  • Sample

    240701-y8hw3sxfph

  • MD5

    1c6355c45e08c13646e47dafcb66690e

  • SHA1

    028c8693ae345438e819c1e0d3a81a85f1fdb648

  • SHA256

    a09bc116716bdf5d7a26f94106ff9f4c8782c8e6fb92d67c5a5dd39ff925dbba

  • SHA512

    6220adf6d0d6c8090b9a460c80cc364606df614646c6d962cd4be93936194607b977547db043b24b35e650391204fec9ce3415426282aab6bba94c8727752b07

  • SSDEEP

    6144:Wl5Gq/tX+pd1bEz2s7ETRhEgFJE/C33I5:WbGq/tX+pd167QhEQE/43+

Score
6/10

Malware Config

Targets

    • Target

      1c6355c45e08c13646e47dafcb66690e_JaffaCakes118

    • Size

      536KB

    • MD5

      1c6355c45e08c13646e47dafcb66690e

    • SHA1

      028c8693ae345438e819c1e0d3a81a85f1fdb648

    • SHA256

      a09bc116716bdf5d7a26f94106ff9f4c8782c8e6fb92d67c5a5dd39ff925dbba

    • SHA512

      6220adf6d0d6c8090b9a460c80cc364606df614646c6d962cd4be93936194607b977547db043b24b35e650391204fec9ce3415426282aab6bba94c8727752b07

    • SSDEEP

      6144:Wl5Gq/tX+pd1bEz2s7ETRhEgFJE/C33I5:WbGq/tX+pd167QhEQE/43+

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks