General

  • Target

    4d580d06b11d2ff2dcf2c41f4c8c30ef_JaffaCakes118

  • Size

    483KB

  • Sample

    240716-jczgma1dmm

  • MD5

    4d580d06b11d2ff2dcf2c41f4c8c30ef

  • SHA1

    9a45f9544a4867b67d22f36715ea1a59b325f285

  • SHA256

    03ba14ded678b6252fa6dd4fff63e878fb8bd885dd10c428cc4835ee0b782bda

  • SHA512

    e7d3c9badc8c9e7af6530c0ffad67742c3323b59c7db6722d88f5ba1cdd1a90ec9fa398885ebbfb4bb0311b421e1311c90a3876aa121cfe039cb87e07180ba47

  • SSDEEP

    12288:SrdowI9xV9Htra/6WhCZQ3rMujRGJcYh9GQDqqUq+:Srdo9bdY/fQZE79S6CUq+

Score
7/10
upx

Malware Config

Targets

    • Target

      4d580d06b11d2ff2dcf2c41f4c8c30ef_JaffaCakes118

    • Size

      483KB

    • MD5

      4d580d06b11d2ff2dcf2c41f4c8c30ef

    • SHA1

      9a45f9544a4867b67d22f36715ea1a59b325f285

    • SHA256

      03ba14ded678b6252fa6dd4fff63e878fb8bd885dd10c428cc4835ee0b782bda

    • SHA512

      e7d3c9badc8c9e7af6530c0ffad67742c3323b59c7db6722d88f5ba1cdd1a90ec9fa398885ebbfb4bb0311b421e1311c90a3876aa121cfe039cb87e07180ba47

    • SSDEEP

      12288:SrdowI9xV9Htra/6WhCZQ3rMujRGJcYh9GQDqqUq+:Srdo9bdY/fQZE79S6CUq+

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks