General

  • Target

    b0fb4c1d9b751cafb18c57819b09f515_JaffaCakes118

  • Size

    308KB

  • Sample

    240820-1r37ssvfmf

  • MD5

    b0fb4c1d9b751cafb18c57819b09f515

  • SHA1

    c41d8e8ecea87b4f3d7a14ae97ce5673929807dd

  • SHA256

    1910d1c098b73d3dc5bedeba909c29de73ec7c7c5528643c5594f99acc752dba

  • SHA512

    f10910d52d2f6e8483e495020fca19d101e0561676512ab0f23dc1cdd15d64b35006cc29697ee1ca0d3cc7c19763ba6957de9296912a7a75ea5aa321b19a57f9

  • SSDEEP

    6144:hRDhBONy1so2y4ZCZVc1hODJBluJgIG59i98xU8hYse:hJOksU44wheZu2IGb/i8hYs

Malware Config

Targets

    • Target

      b0fb4c1d9b751cafb18c57819b09f515_JaffaCakes118

    • Size

      308KB

    • MD5

      b0fb4c1d9b751cafb18c57819b09f515

    • SHA1

      c41d8e8ecea87b4f3d7a14ae97ce5673929807dd

    • SHA256

      1910d1c098b73d3dc5bedeba909c29de73ec7c7c5528643c5594f99acc752dba

    • SHA512

      f10910d52d2f6e8483e495020fca19d101e0561676512ab0f23dc1cdd15d64b35006cc29697ee1ca0d3cc7c19763ba6957de9296912a7a75ea5aa321b19a57f9

    • SSDEEP

      6144:hRDhBONy1so2y4ZCZVc1hODJBluJgIG59i98xU8hYse:hJOksU44wheZu2IGb/i8hYs

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks