General

  • Target

    946d0eee5884d33287c747e79c6d0dc8_JaffaCakes118

  • Size

    129KB

  • Sample

    240813-x7cg8swgrm

  • MD5

    946d0eee5884d33287c747e79c6d0dc8

  • SHA1

    5b498359ee642d3e9ee657b0230adee44fd8597e

  • SHA256

    14ad6ce0d0c5f6f0b0cc6c5d776c0ae4031201cdd56f4ae2cea9ce208984a84a

  • SHA512

    0e0b0aa7549b5064868efcb297d77e2718d90541d4d5922c9a919fe2734da1f451315cc5a81f8ef588a59999257a401ea0664c0fb7ec604ad3832e1a22063459

  • SSDEEP

    1536:+paYJvQ/uMc/JgAkO/Ft02r50HQvKkxsnouy80aVg:gJcuMc/Rk6FaU8k2out0au

Malware Config

Targets

    • Target

      946d0eee5884d33287c747e79c6d0dc8_JaffaCakes118

    • Size

      129KB

    • MD5

      946d0eee5884d33287c747e79c6d0dc8

    • SHA1

      5b498359ee642d3e9ee657b0230adee44fd8597e

    • SHA256

      14ad6ce0d0c5f6f0b0cc6c5d776c0ae4031201cdd56f4ae2cea9ce208984a84a

    • SHA512

      0e0b0aa7549b5064868efcb297d77e2718d90541d4d5922c9a919fe2734da1f451315cc5a81f8ef588a59999257a401ea0664c0fb7ec604ad3832e1a22063459

    • SSDEEP

      1536:+paYJvQ/uMc/JgAkO/Ft02r50HQvKkxsnouy80aVg:gJcuMc/Rk6FaU8k2out0au

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks