General

  • Target

    ab901ee7309f9347d41ed8610edd173d_JaffaCakes118

  • Size

    38KB

  • Sample

    240819-syeh1sscja

  • MD5

    ab901ee7309f9347d41ed8610edd173d

  • SHA1

    a4d07c5e99be809f11446829902ddd4ba5731acd

  • SHA256

    662c59d63fd8ef72d7f09fd4a8f64fb8da2edbe2171af6f713b9b676fbff2db5

  • SHA512

    3d0ffc458771034a66d052ab9e1d3d6990dca450b0ea62012bcb89f7fedcc86daa2eca79d26c9b9332fc70fb161786627ed431e090d73d268578621baf9d18ac

  • SSDEEP

    768:gF75Qu6d+I5m5XzrJCIp3ptMDW5cxsNxUtJqlPgX:4aUXQI9wDW5XN6t8YX

Score
7/10

Malware Config

Targets

    • Target

      ab901ee7309f9347d41ed8610edd173d_JaffaCakes118

    • Size

      38KB

    • MD5

      ab901ee7309f9347d41ed8610edd173d

    • SHA1

      a4d07c5e99be809f11446829902ddd4ba5731acd

    • SHA256

      662c59d63fd8ef72d7f09fd4a8f64fb8da2edbe2171af6f713b9b676fbff2db5

    • SHA512

      3d0ffc458771034a66d052ab9e1d3d6990dca450b0ea62012bcb89f7fedcc86daa2eca79d26c9b9332fc70fb161786627ed431e090d73d268578621baf9d18ac

    • SSDEEP

      768:gF75Qu6d+I5m5XzrJCIp3ptMDW5cxsNxUtJqlPgX:4aUXQI9wDW5XN6t8YX

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks