General

  • Target

    2c7c9e3707cd93f6686e6eeeb2e048ff_JaffaCakes118

  • Size

    54KB

  • Sample

    240708-qgx8pazhql

  • MD5

    2c7c9e3707cd93f6686e6eeeb2e048ff

  • SHA1

    c54a29b7459a03e11d7aa47f316317fbd6beb13e

  • SHA256

    8dc9b1940bde632c45c4874a0d7d4dd5fd91fb1ebf5ec6f9203806287c07a4e5

  • SHA512

    1200967d153301cefb4e6f7c69693f10d0ddfd7da1026d7d96631dc6669e1827271aaa179108c459b8df87afd13ed21ab7b278614ad31159cf78df61541a953b

  • SSDEEP

    768:/vkGOpRbqf2UzavC/imh4iHJXAewEDmAnQtnmnN9fKVoXGa7bK4s8:0pRbqfYs4chrd37bK4s8

Score
8/10

Malware Config

Targets

    • Target

      2c7c9e3707cd93f6686e6eeeb2e048ff_JaffaCakes118

    • Size

      54KB

    • MD5

      2c7c9e3707cd93f6686e6eeeb2e048ff

    • SHA1

      c54a29b7459a03e11d7aa47f316317fbd6beb13e

    • SHA256

      8dc9b1940bde632c45c4874a0d7d4dd5fd91fb1ebf5ec6f9203806287c07a4e5

    • SHA512

      1200967d153301cefb4e6f7c69693f10d0ddfd7da1026d7d96631dc6669e1827271aaa179108c459b8df87afd13ed21ab7b278614ad31159cf78df61541a953b

    • SSDEEP

      768:/vkGOpRbqf2UzavC/imh4iHJXAewEDmAnQtnmnN9fKVoXGa7bK4s8:0pRbqfYs4chrd37bK4s8

    Score
    8/10
    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks