General

  • Target

    7193a79abe154f04400c017270e31131_JaffaCakes118

  • Size

    45KB

  • Sample

    240725-2t3jqazflm

  • MD5

    7193a79abe154f04400c017270e31131

  • SHA1

    2ee9d01af688d4df5908a0fed4e575d70b5d5755

  • SHA256

    49a85c25c7a3abe68a4de48d79eca4ac1da4bcbb59a158464aef52ef00088fe9

  • SHA512

    1d8a23af253cfa6bf78f6b7d38d31ee40bf7c6d5adff733369ab7fbe1d7674abfa523ac2597edee74ad338508a2607879cec908ded236c7cf574835befb4668c

  • SSDEEP

    768:X323i/5MqKWo+CBe0dyvumWGpgIZ/jjPFjwUMaJiApGHNb6mBu:Ii/5MtWo+C80UcGpR/jjPpaSiApGtWsu

Score
7/10

Malware Config

Targets

    • Target

      7193a79abe154f04400c017270e31131_JaffaCakes118

    • Size

      45KB

    • MD5

      7193a79abe154f04400c017270e31131

    • SHA1

      2ee9d01af688d4df5908a0fed4e575d70b5d5755

    • SHA256

      49a85c25c7a3abe68a4de48d79eca4ac1da4bcbb59a158464aef52ef00088fe9

    • SHA512

      1d8a23af253cfa6bf78f6b7d38d31ee40bf7c6d5adff733369ab7fbe1d7674abfa523ac2597edee74ad338508a2607879cec908ded236c7cf574835befb4668c

    • SSDEEP

      768:X323i/5MqKWo+CBe0dyvumWGpgIZ/jjPFjwUMaJiApGHNb6mBu:Ii/5MtWo+C80UcGpR/jjPpaSiApGtWsu

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks