General

  • Target

    26cfdde81e05d05acd41d6fb3a653dc9_JaffaCakes118

  • Size

    216KB

  • Sample

    240705-k785zswaqq

  • MD5

    26cfdde81e05d05acd41d6fb3a653dc9

  • SHA1

    329f18f04802d7529c3e228ad43a177a55a9968d

  • SHA256

    cdd7e62c0346cfb1d56026da1f3fcb0a401908d0cc74561c543b98e0fdce8d51

  • SHA512

    d213c63c7d607114e8cdcb523add90c5fc59164d3f8b8c88838a730c8f67fc84a342167a9f1fe2415a61dac8af70d0bac200e92a62facabc1fc4ad237f1002b7

  • SSDEEP

    6144:csYzVCyuasshciAURsqqRGU7Wu4I0Z/xb:csGCygsCURsqqL30Z/l

Score
7/10
upx

Malware Config

Targets

    • Target

      26cfdde81e05d05acd41d6fb3a653dc9_JaffaCakes118

    • Size

      216KB

    • MD5

      26cfdde81e05d05acd41d6fb3a653dc9

    • SHA1

      329f18f04802d7529c3e228ad43a177a55a9968d

    • SHA256

      cdd7e62c0346cfb1d56026da1f3fcb0a401908d0cc74561c543b98e0fdce8d51

    • SHA512

      d213c63c7d607114e8cdcb523add90c5fc59164d3f8b8c88838a730c8f67fc84a342167a9f1fe2415a61dac8af70d0bac200e92a62facabc1fc4ad237f1002b7

    • SSDEEP

      6144:csYzVCyuasshciAURsqqRGU7Wu4I0Z/xb:csGCygsCURsqqL30Z/l

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks