General

  • Target

    83c31c06dd1b559f6628266f7702c1d7_JaffaCakes118

  • Size

    148KB

  • Sample

    240809-17gzhasblp

  • MD5

    83c31c06dd1b559f6628266f7702c1d7

  • SHA1

    6ac818e42dc682eb7f59e526384aa5e43e46a267

  • SHA256

    97343ac82f25b3d0c1e1d3c78ec53933e94ab3e116862f5c89e0317438a1e646

  • SHA512

    6bd8d50a0024c9f15379ca384cef138c5f399d004b13026cb6379d7163223a1d79036042ee23e29854d74dc7acca2bd751d2f1ee15624fa78cf00a408fd3e06c

  • SSDEEP

    3072:c5nGk3qWPwPrH/99UW65utWVXOle/RcKk2mtjk:c5Gk34PLj6sg9Xk28k

Score
7/10

Malware Config

Targets

    • Target

      83c31c06dd1b559f6628266f7702c1d7_JaffaCakes118

    • Size

      148KB

    • MD5

      83c31c06dd1b559f6628266f7702c1d7

    • SHA1

      6ac818e42dc682eb7f59e526384aa5e43e46a267

    • SHA256

      97343ac82f25b3d0c1e1d3c78ec53933e94ab3e116862f5c89e0317438a1e646

    • SHA512

      6bd8d50a0024c9f15379ca384cef138c5f399d004b13026cb6379d7163223a1d79036042ee23e29854d74dc7acca2bd751d2f1ee15624fa78cf00a408fd3e06c

    • SSDEEP

      3072:c5nGk3qWPwPrH/99UW65utWVXOle/RcKk2mtjk:c5Gk34PLj6sg9Xk28k

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks