General

  • Target

    2e5cb4c6ad566df6ddb6e71b2ff5a3a6_JaffaCakes118

  • Size

    75KB

  • Sample

    240709-appcraygmh

  • MD5

    2e5cb4c6ad566df6ddb6e71b2ff5a3a6

  • SHA1

    eef21b24d068e379379b9dedd55b5355c941e88c

  • SHA256

    6d8583dd983ff73a24a4c4c2a6ee889ecddb1a3020f7b480b320ab477698f551

  • SHA512

    ae31ea8cd60b49c5a240f8100cfed13b6e8edb06e73ebf34ecebe6509024063af5e577b509683bdbe548479966067f1914f0680627fda3c928f5eee716062c5b

  • SSDEEP

    1536:piZVO+X68S46+jXqYsCVeGFU1ETN5PMl8jXbf:p36pS46+7qYBFDNql0Xz

Score
6/10

Malware Config

Targets

    • Target

      2e5cb4c6ad566df6ddb6e71b2ff5a3a6_JaffaCakes118

    • Size

      75KB

    • MD5

      2e5cb4c6ad566df6ddb6e71b2ff5a3a6

    • SHA1

      eef21b24d068e379379b9dedd55b5355c941e88c

    • SHA256

      6d8583dd983ff73a24a4c4c2a6ee889ecddb1a3020f7b480b320ab477698f551

    • SHA512

      ae31ea8cd60b49c5a240f8100cfed13b6e8edb06e73ebf34ecebe6509024063af5e577b509683bdbe548479966067f1914f0680627fda3c928f5eee716062c5b

    • SSDEEP

      1536:piZVO+X68S46+jXqYsCVeGFU1ETN5PMl8jXbf:p36pS46+7qYBFDNql0Xz

    Score
    6/10
    • Modifies WinLogon

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks