General

  • Target

    8dd7774273ec05b8f4cd76dbd5fa0536_JaffaCakes118

  • Size

    206KB

  • Sample

    240812-h9l25a1cjn

  • MD5

    8dd7774273ec05b8f4cd76dbd5fa0536

  • SHA1

    0bc70e6b4309b778f25ea62bd9932c579a6b9d7c

  • SHA256

    95a851ae53133dcd5c50a145f0a11addd40ec625c43151f619179562a34d65c0

  • SHA512

    5b0378ce07193bf73a2c948aec46850df68a7d8ad786058e9cb2efe37424374a3b31228dcb8ee8c368ebfdc9fff78e2f99730c6c18d0ce273b5e5a0e32f79ff1

  • SSDEEP

    6144:Uo6rccSdFzjUJmQqfgGCdSN+evUa7X5u7M:UoxcSrzjc9JGC01Ua7W

Score
7/10

Malware Config

Targets

    • Target

      8dd7774273ec05b8f4cd76dbd5fa0536_JaffaCakes118

    • Size

      206KB

    • MD5

      8dd7774273ec05b8f4cd76dbd5fa0536

    • SHA1

      0bc70e6b4309b778f25ea62bd9932c579a6b9d7c

    • SHA256

      95a851ae53133dcd5c50a145f0a11addd40ec625c43151f619179562a34d65c0

    • SHA512

      5b0378ce07193bf73a2c948aec46850df68a7d8ad786058e9cb2efe37424374a3b31228dcb8ee8c368ebfdc9fff78e2f99730c6c18d0ce273b5e5a0e32f79ff1

    • SSDEEP

      6144:Uo6rccSdFzjUJmQqfgGCdSN+evUa7X5u7M:UoxcSrzjc9JGC01Ua7W

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks