General

  • Target

    2bd06c38c71a46a51c22367899376efa_JaffaCakes118

  • Size

    270KB

  • Sample

    240708-len5sasfml

  • MD5

    2bd06c38c71a46a51c22367899376efa

  • SHA1

    25c24dbd4fb782a7d0ea5bfdde7c1e908929b303

  • SHA256

    61811f45ef97983891df1fd7b62a059ee07ebdce3309a793653fb35567d59128

  • SHA512

    a23d237c882e675bafcff26080da3e86c88d4f1684d9becfa968eafa582aaa6a723ece002acb29df651963dda41eba6f3f0b9ec2ce8735cddbb911c07a44502b

  • SSDEEP

    6144:4raAZKHzAMVjYEiNxbmyAsx77jqdru+iBRble4oaQZpnK1hMdHP:4rhZKHzAMVUNxyzsxfjqA+iBR6aWpnKM

Score
10/10

Malware Config

Targets

    • Target

      2bd06c38c71a46a51c22367899376efa_JaffaCakes118

    • Size

      270KB

    • MD5

      2bd06c38c71a46a51c22367899376efa

    • SHA1

      25c24dbd4fb782a7d0ea5bfdde7c1e908929b303

    • SHA256

      61811f45ef97983891df1fd7b62a059ee07ebdce3309a793653fb35567d59128

    • SHA512

      a23d237c882e675bafcff26080da3e86c88d4f1684d9becfa968eafa582aaa6a723ece002acb29df651963dda41eba6f3f0b9ec2ce8735cddbb911c07a44502b

    • SSDEEP

      6144:4raAZKHzAMVjYEiNxbmyAsx77jqdru+iBRble4oaQZpnK1hMdHP:4rhZKHzAMVUNxyzsxfjqA+iBR6aWpnKM

    Score
    10/10
    • Modifies WinLogon for persistence

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks