General

  • Target

    690d2180b8963c8b02c0ff72140c9868_JaffaCakes118

  • Size

    71KB

  • Sample

    240723-1kxrfatblg

  • MD5

    690d2180b8963c8b02c0ff72140c9868

  • SHA1

    4ec10913cbb0a1f4ba68672272d5e83dff79902f

  • SHA256

    68a01eef484d134f3696ccb616620c60f4ae1d706432344a4ccd9c1c6d3f99b4

  • SHA512

    966ce05c6c79e5fa6f920ca168fb2722f915fa2819a5a97538297ba5c5ecc3f0139a8c4d13a228e195929cd43700a7d8471c4fc6f259e6979b389579df585096

  • SSDEEP

    1536:6MTKdJYU4zxN3j7Cy672stRJ971Zr+vzC1kQ:fT8JYU4dZj7Cy02stF11+vzxQ

Score
7/10

Malware Config

Targets

    • Target

      690d2180b8963c8b02c0ff72140c9868_JaffaCakes118

    • Size

      71KB

    • MD5

      690d2180b8963c8b02c0ff72140c9868

    • SHA1

      4ec10913cbb0a1f4ba68672272d5e83dff79902f

    • SHA256

      68a01eef484d134f3696ccb616620c60f4ae1d706432344a4ccd9c1c6d3f99b4

    • SHA512

      966ce05c6c79e5fa6f920ca168fb2722f915fa2819a5a97538297ba5c5ecc3f0139a8c4d13a228e195929cd43700a7d8471c4fc6f259e6979b389579df585096

    • SSDEEP

      1536:6MTKdJYU4zxN3j7Cy672stRJ971Zr+vzC1kQ:fT8JYU4dZj7Cy02stF11+vzxQ

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks