General

  • Target

    abafdb04cbd04d6efd167649abbb3515_JaffaCakes118

  • Size

    1.9MB

  • Sample

    240819-tncgcaxdnk

  • MD5

    abafdb04cbd04d6efd167649abbb3515

  • SHA1

    dc8d6666a9bfeca444bcbe69ab311249c5ea75c3

  • SHA256

    bbfc8a1cfe70fc2ec45d3c2b2c8e14965848cc6d04609ca787ae4515d2a9ee7c

  • SHA512

    58bd7eb4d0314596dee93776956a751e54ed1c026f75a6b8fcd6a4c8983839fbecd573e85f3711a5a767b8c44b7fa2eeef1a299e68522c27bb55eed845d7c968

  • SSDEEP

    49152:K/6GK+/qrTBCv8v+YOt4DdWXvpHciCp7pKHcuwqzaY:KFKMqrTBM8Gjtc+hmp9KHtKY

Score
7/10

Malware Config

Targets

    • Target

      155ɫվ.url

    • Size

      219B

    • MD5

      3a1f2a8a3ef08ae269517a69ea918b2c

    • SHA1

      7d2e6719702bc8472e045e010efa6ed3f7df4b5b

    • SHA256

      66eafefa8bb0155e60828476bde6068573fe64a4fd0aa052eba074dbe85d46cd

    • SHA512

      22203a78192cadc02d0f887247675925273a69e3be82ec1a331197f892216a282cc8f37c3ffbfb578a708244181037277b8cc6a40d8ec70cdf0feac5d80f8576

    Score
    1/10
    • Target

      DNF0323.03.exe

    • Size

      2.0MB

    • MD5

      9f62aaa112105fb3702a0d9be5cc6283

    • SHA1

      fef7719446b3de0155533b01c51f7eb5fcc63c3a

    • SHA256

      96092ed1a0a669166f0ca2ad0aff97b3ec9180f42b7e97d42dd3a096ba9a2dbf

    • SHA512

      9e1215611ed47b27fa2efc460f95373b262ef72eff716c906cd0b439092011e762445a81b183b9cb2481a9a3696fef273d3c8c336584e3d2232dafdbecf9bde3

    • SSDEEP

      49152:qX6u6+WgGuQmy96t4+Q9wfH1bxbn85ama:q9MglQh6SX9wFhn8AJ

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks