General

  • Target

    44c60b7d18e1341385685f2ee9d3b0e9_JaffaCakes118

  • Size

    135KB

  • Sample

    240714-hqsessshqf

  • MD5

    44c60b7d18e1341385685f2ee9d3b0e9

  • SHA1

    d37c047c50291673567d7cfef7c90e74beb262b6

  • SHA256

    495f2bbe38cadc94aa1e4fb54ebe59673e8c6edfb0a09ad06901821c7c6bcd44

  • SHA512

    7d38649ee7e509a26a2176b06d4a7b3ae36df05d27396877aea0b001e09ee4912fbaedfeea71a1f9bc44d9d30d5c4bf3e8477abd5df2e31ca714310bae2db5bb

  • SSDEEP

    3072:NBrd2RMwKaq8B3SHOAH+/gZ0MqNM+aqt:H52myq8ZgJH+/g+LN2u

Score
7/10

Malware Config

Targets

    • Target

      44c60b7d18e1341385685f2ee9d3b0e9_JaffaCakes118

    • Size

      135KB

    • MD5

      44c60b7d18e1341385685f2ee9d3b0e9

    • SHA1

      d37c047c50291673567d7cfef7c90e74beb262b6

    • SHA256

      495f2bbe38cadc94aa1e4fb54ebe59673e8c6edfb0a09ad06901821c7c6bcd44

    • SHA512

      7d38649ee7e509a26a2176b06d4a7b3ae36df05d27396877aea0b001e09ee4912fbaedfeea71a1f9bc44d9d30d5c4bf3e8477abd5df2e31ca714310bae2db5bb

    • SSDEEP

      3072:NBrd2RMwKaq8B3SHOAH+/gZ0MqNM+aqt:H52myq8ZgJH+/g+LN2u

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks