General

  • Target

    63893203f58fc641c0bc09b6b925ce39_JaffaCakes118

  • Size

    187KB

  • Sample

    240722-rsd5masbnf

  • MD5

    63893203f58fc641c0bc09b6b925ce39

  • SHA1

    a8ea7105dd766f912f038e1001fa994583ed4413

  • SHA256

    22f7a9926c6a906a4b5d54810cc2de5ebf4a8899c9728e9ea4069b334a365fed

  • SHA512

    9cab21495410cf92b19f69cc786aa2030c9ce9d0a8ec6f6b8f2a9d121371962bbacbc65acd5c4c0cc32554cb535d5d4de98fb5f09db46f59b378bdcc85192711

  • SSDEEP

    3072:l2OJOFSUwUyKfM5Iq48bwfeQ0hF/fYmdbxGZlcy9wKC50sNj7NpcEt0:l4FKXqMzbwJ0hhhbx22y5C50sd7U9

Score
7/10

Malware Config

Targets

    • Target

      63893203f58fc641c0bc09b6b925ce39_JaffaCakes118

    • Size

      187KB

    • MD5

      63893203f58fc641c0bc09b6b925ce39

    • SHA1

      a8ea7105dd766f912f038e1001fa994583ed4413

    • SHA256

      22f7a9926c6a906a4b5d54810cc2de5ebf4a8899c9728e9ea4069b334a365fed

    • SHA512

      9cab21495410cf92b19f69cc786aa2030c9ce9d0a8ec6f6b8f2a9d121371962bbacbc65acd5c4c0cc32554cb535d5d4de98fb5f09db46f59b378bdcc85192711

    • SSDEEP

      3072:l2OJOFSUwUyKfM5Iq48bwfeQ0hF/fYmdbxGZlcy9wKC50sNj7NpcEt0:l4FKXqMzbwJ0hhhbx22y5C50sd7U9

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks