General

  • Target

    5c91d45b6dd0b160bb882faa9963f673_JaffaCakes118

  • Size

    156KB

  • Sample

    240719-s3ve2a1grf

  • MD5

    5c91d45b6dd0b160bb882faa9963f673

  • SHA1

    eb9450b9f231c25da6fe2bcaa55ff8a9295eba23

  • SHA256

    e5fd3a3db7daf8d6bfdcf5f793667c2c65806dd9a5d6872100b94ccd7b8b26cd

  • SHA512

    10bd26c42baabeaf12cbab8e52bdbb96d476b5d8183862ef18012fdc8d67253f267b2a396b4bca4df10e8552072cdeaf5c8c8292f5825e3041d38aa37bbefd1c

  • SSDEEP

    1536:3OHqbQM5IDyYc6GevATlgJr+b8NUv8BRwZuDkcWvQitAg5GSR:e4B5W7GevkI+GwMKgQF9AgYG

Score
8/10

Malware Config

Targets

    • Target

      5c91d45b6dd0b160bb882faa9963f673_JaffaCakes118

    • Size

      156KB

    • MD5

      5c91d45b6dd0b160bb882faa9963f673

    • SHA1

      eb9450b9f231c25da6fe2bcaa55ff8a9295eba23

    • SHA256

      e5fd3a3db7daf8d6bfdcf5f793667c2c65806dd9a5d6872100b94ccd7b8b26cd

    • SHA512

      10bd26c42baabeaf12cbab8e52bdbb96d476b5d8183862ef18012fdc8d67253f267b2a396b4bca4df10e8552072cdeaf5c8c8292f5825e3041d38aa37bbefd1c

    • SSDEEP

      1536:3OHqbQM5IDyYc6GevATlgJr+b8NUv8BRwZuDkcWvQitAg5GSR:e4B5W7GevkI+GwMKgQF9AgYG

    Score
    8/10
    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks