General

  • Target

    5c5a31e3eb58d8809b62bdb1852cfb21_JaffaCakes118

  • Size

    41KB

  • Sample

    240719-rxlehazakc

  • MD5

    5c5a31e3eb58d8809b62bdb1852cfb21

  • SHA1

    58bc184ceda74c19558424f474f9abfc8ce7a7dd

  • SHA256

    9252858a56629b3cf53f1fc98b175342caa24e34ab81fc2ef3008a5b6b5aebc4

  • SHA512

    dc761f9964536c5af15011b88fc3a6bcb3596ce5484a1688b00cf3546a12de1998252bbc7fa23b1a4930552ce6040a1b5ccbf096a7d8f154590ce8f705123318

  • SSDEEP

    768:tk/oqTjzgOKbJBCba44joMTB4EtfBk9slLkLc6XowSJtb6FLPrrPCevIf33:OlTIOKb/nj7Bxbl8XzSJtbULrTdv0H

Score
7/10
upx

Malware Config

Targets

    • Target

      5c5a31e3eb58d8809b62bdb1852cfb21_JaffaCakes118

    • Size

      41KB

    • MD5

      5c5a31e3eb58d8809b62bdb1852cfb21

    • SHA1

      58bc184ceda74c19558424f474f9abfc8ce7a7dd

    • SHA256

      9252858a56629b3cf53f1fc98b175342caa24e34ab81fc2ef3008a5b6b5aebc4

    • SHA512

      dc761f9964536c5af15011b88fc3a6bcb3596ce5484a1688b00cf3546a12de1998252bbc7fa23b1a4930552ce6040a1b5ccbf096a7d8f154590ce8f705123318

    • SSDEEP

      768:tk/oqTjzgOKbJBCba44joMTB4EtfBk9slLkLc6XowSJtb6FLPrrPCevIf33:OlTIOKb/nj7Bxbl8XzSJtbULrTdv0H

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks