General

  • Target

    4445a1fb09c4563320e690801b122f2e_JaffaCakes118

  • Size

    488KB

  • Sample

    240714-evspksyelc

  • MD5

    4445a1fb09c4563320e690801b122f2e

  • SHA1

    303f68527b0bbf40dcc4a2bcdd54355ecea8fcb1

  • SHA256

    7f744868222acc5b95f7082180a1520e7ac6b8c5c5673595f982c6cfed4a4612

  • SHA512

    c358ab5817e42d6722a984f49e36027b04f77d780a6a9c0abbf929ae7b14df57541419d0465ff6f62dceb0b31abbd446dce66af31c95ce957db8b122ecbe10fd

  • SSDEEP

    12288:aNSTHCkc4in1lNToZuXeKZmZLKiRcskOpJa/JIV9gm1:Fm1lxoZtgmRKmlpJaRI

Score
7/10
upx

Malware Config

Targets

    • Target

      4445a1fb09c4563320e690801b122f2e_JaffaCakes118

    • Size

      488KB

    • MD5

      4445a1fb09c4563320e690801b122f2e

    • SHA1

      303f68527b0bbf40dcc4a2bcdd54355ecea8fcb1

    • SHA256

      7f744868222acc5b95f7082180a1520e7ac6b8c5c5673595f982c6cfed4a4612

    • SHA512

      c358ab5817e42d6722a984f49e36027b04f77d780a6a9c0abbf929ae7b14df57541419d0465ff6f62dceb0b31abbd446dce66af31c95ce957db8b122ecbe10fd

    • SSDEEP

      12288:aNSTHCkc4in1lNToZuXeKZmZLKiRcskOpJa/JIV9gm1:Fm1lxoZtgmRKmlpJaRI

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks