General

  • Target

    48ac30e5215c1d087f09c70012c22b05_JaffaCakes118

  • Size

    109KB

  • Sample

    240715-hlbw9ataqm

  • MD5

    48ac30e5215c1d087f09c70012c22b05

  • SHA1

    7a421b7cd1c3a61c4aee9431d17261ed3748410e

  • SHA256

    b40e5da022423cc57df901926cd39996c539d2ea2f04394d7d173b9fa1f965ca

  • SHA512

    1cd44ed1fa8eeaef192140cc948d23f6954312309a845d7997f5fab41a168d50514ac38c768db8dabb358017a135d9b805e14146a10c31adb93fbbdd399a8213

  • SSDEEP

    3072:vlHrJgXDrIaR0fTmNXT29XK7qmei1AOO7VgC61KhPd/:9HiXDVReTmN7qxgC61K9V

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    coolrazor555.hop.ru
  • Port:
    21
  • Username:
    w337353
  • Password:
    5lfxjjep

Targets

    • Target

      48ac30e5215c1d087f09c70012c22b05_JaffaCakes118

    • Size

      109KB

    • MD5

      48ac30e5215c1d087f09c70012c22b05

    • SHA1

      7a421b7cd1c3a61c4aee9431d17261ed3748410e

    • SHA256

      b40e5da022423cc57df901926cd39996c539d2ea2f04394d7d173b9fa1f965ca

    • SHA512

      1cd44ed1fa8eeaef192140cc948d23f6954312309a845d7997f5fab41a168d50514ac38c768db8dabb358017a135d9b805e14146a10c31adb93fbbdd399a8213

    • SSDEEP

      3072:vlHrJgXDrIaR0fTmNXT29XK7qmei1AOO7VgC61KhPd/:9HiXDVReTmN7qxgC61K9V

    Score
    10/10
    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks