General

  • Target

    76c24dbde45bb42b3b6a98e030d89102_JaffaCakes118

  • Size

    192KB

  • Sample

    240727-c62eravepc

  • MD5

    76c24dbde45bb42b3b6a98e030d89102

  • SHA1

    8f133f9f94ed9dfda9e5b496b5cb8f0480f900cc

  • SHA256

    8e935c9e9653d9052e2811580f56dbed506e6b83592a2dcf83fbdfc8fae14a6e

  • SHA512

    16517f0c51fc74f26073ef03cbafd19089d0cacc11e1ca40fc8db001e04c1dd69faa9b38b26e1f7acf335ea40e4648a2849fa423b8dd17d7a4176d8cfef0d336

  • SSDEEP

    3072:h+Vf4n9he8RQstpZeT7irQr/6xUzsRI5OQ3krPk:IfAhe8HLYqQrAVW+

Score
7/10

Malware Config

Targets

    • Target

      76c24dbde45bb42b3b6a98e030d89102_JaffaCakes118

    • Size

      192KB

    • MD5

      76c24dbde45bb42b3b6a98e030d89102

    • SHA1

      8f133f9f94ed9dfda9e5b496b5cb8f0480f900cc

    • SHA256

      8e935c9e9653d9052e2811580f56dbed506e6b83592a2dcf83fbdfc8fae14a6e

    • SHA512

      16517f0c51fc74f26073ef03cbafd19089d0cacc11e1ca40fc8db001e04c1dd69faa9b38b26e1f7acf335ea40e4648a2849fa423b8dd17d7a4176d8cfef0d336

    • SSDEEP

      3072:h+Vf4n9he8RQstpZeT7irQr/6xUzsRI5OQ3krPk:IfAhe8HLYqQrAVW+

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks