General

  • Target

    2a96b326fbc5483c265062375858cf41_JaffaCakes118

  • Size

    136KB

  • Sample

    240708-cdbnmaxbln

  • MD5

    2a96b326fbc5483c265062375858cf41

  • SHA1

    b526341727d39b7514900bb61e2f343eb4c03e7c

  • SHA256

    795db2aed673d4c0e299d4ff47687f6043df38c56bb5559de75a580610a62dd9

  • SHA512

    b09577028fb31ea972f7f2ead2a501b5da8280d7daeeee4f9f408ef2266fea6f66e22dba7abe625f69fb2db9de0841de32ba6ca2e068acbb6c33a3c04bd1c862

  • SSDEEP

    3072:rg1YWRTd8Nwj1yA5jPDAsmmPfbTSJ5mZVwdSC03Q:rARTxD5jUsmmPfnS3m/KSCZ

Score
6/10

Malware Config

Targets

    • Target

      2a96b326fbc5483c265062375858cf41_JaffaCakes118

    • Size

      136KB

    • MD5

      2a96b326fbc5483c265062375858cf41

    • SHA1

      b526341727d39b7514900bb61e2f343eb4c03e7c

    • SHA256

      795db2aed673d4c0e299d4ff47687f6043df38c56bb5559de75a580610a62dd9

    • SHA512

      b09577028fb31ea972f7f2ead2a501b5da8280d7daeeee4f9f408ef2266fea6f66e22dba7abe625f69fb2db9de0841de32ba6ca2e068acbb6c33a3c04bd1c862

    • SSDEEP

      3072:rg1YWRTd8Nwj1yA5jPDAsmmPfbTSJ5mZVwdSC03Q:rARTxD5jUsmmPfnS3m/KSCZ

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks