General

  • Target

    29e84e484fd26bdc349034d9dd90fe3d_JaffaCakes118

  • Size

    83KB

  • Sample

    240707-l3z7ys1hka

  • MD5

    29e84e484fd26bdc349034d9dd90fe3d

  • SHA1

    b6cf3c96aefb297df832cb66f0b8b3579bff6e9c

  • SHA256

    725d5bdbb1bffd628a9b976a4b7936c6cbcedd894e02f8841d1df9fcda4def19

  • SHA512

    df3accc8be80061e1a8dd2a91adf2a4232754b7862949f96a4f2ef2576ff51ea04e845429a111cde44fc9d9142ec9c3827b9f963f99998fd4ca7849643d51dd6

  • SSDEEP

    1536:kS05pSPWIUD0IOi7tmpjXV0p5ODldztr37CQkbb0+Gs0uQr:kLpSP1OpKjyeDlvXCNwv/3r

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.wallst.ru
  • Port:
    21
  • Username:
    u319763
  • Password:
    wim49g5y

Targets

    • Target

      29e84e484fd26bdc349034d9dd90fe3d_JaffaCakes118

    • Size

      83KB

    • MD5

      29e84e484fd26bdc349034d9dd90fe3d

    • SHA1

      b6cf3c96aefb297df832cb66f0b8b3579bff6e9c

    • SHA256

      725d5bdbb1bffd628a9b976a4b7936c6cbcedd894e02f8841d1df9fcda4def19

    • SHA512

      df3accc8be80061e1a8dd2a91adf2a4232754b7862949f96a4f2ef2576ff51ea04e845429a111cde44fc9d9142ec9c3827b9f963f99998fd4ca7849643d51dd6

    • SSDEEP

      1536:kS05pSPWIUD0IOi7tmpjXV0p5ODldztr37CQkbb0+Gs0uQr:kLpSP1OpKjyeDlvXCNwv/3r

    Score
    10/10
    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks