General

  • Target

    39995c03260fe8f31763600994d55401_JaffaCakes118

  • Size

    35KB

  • Sample

    240711-sb6nzstemd

  • MD5

    39995c03260fe8f31763600994d55401

  • SHA1

    1e2a3f9b29c014ebefaed7c1bd163da9d9de23e0

  • SHA256

    cb4aa07f83e36aaac8270659606a1585f890b0e450842231cbb62fcbb7a41f1a

  • SHA512

    d4cf74a7205d5e28500aa5ae293d078b8bdeef0cc066fbc126347d7ed3dcfff124870e9aa5946987a6d038b9183bd4e6ededbdeb9b276985b025539678673388

  • SSDEEP

    768:00YBEglpqqht8y7kHYJs1qbo9kXCJ2SqPpNEjW2gq:Od5htVQ4U+o9XNq4W2gq

Score
7/10

Malware Config

Targets

    • Target

      39995c03260fe8f31763600994d55401_JaffaCakes118

    • Size

      35KB

    • MD5

      39995c03260fe8f31763600994d55401

    • SHA1

      1e2a3f9b29c014ebefaed7c1bd163da9d9de23e0

    • SHA256

      cb4aa07f83e36aaac8270659606a1585f890b0e450842231cbb62fcbb7a41f1a

    • SHA512

      d4cf74a7205d5e28500aa5ae293d078b8bdeef0cc066fbc126347d7ed3dcfff124870e9aa5946987a6d038b9183bd4e6ededbdeb9b276985b025539678673388

    • SSDEEP

      768:00YBEglpqqht8y7kHYJs1qbo9kXCJ2SqPpNEjW2gq:Od5htVQ4U+o9XNq4W2gq

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks