General

  • Target

    ad9d6c39f2bed4be4ac7290877ab502a_JaffaCakes118

  • Size

    214KB

  • Sample

    240820-dc8seatglr

  • MD5

    ad9d6c39f2bed4be4ac7290877ab502a

  • SHA1

    0ed00bceefd748d7dbe8a3fab86826ae7e1afc7a

  • SHA256

    5de4bbfa84eae9863915224822cd1bf6ba99521569857d317cd153f43746da2f

  • SHA512

    1d0baa092231fa5f8b85f81e51f4bcdeff2c0d699b8d6a3864a9076360b64ce1c8c0e65b83c379292bbe36bc340b6a4ecb66c4caa7a0315886628a907380e689

  • SSDEEP

    3072:mZxATx98i3T53juFotRia4WPw0Ukin8iA8Ve3f7R5Pk7LgrsvYfqo:mQTD8i3Juk0aXPw5rApvN5Pk/gqR

Score
7/10

Malware Config

Targets

    • Target

      ad9d6c39f2bed4be4ac7290877ab502a_JaffaCakes118

    • Size

      214KB

    • MD5

      ad9d6c39f2bed4be4ac7290877ab502a

    • SHA1

      0ed00bceefd748d7dbe8a3fab86826ae7e1afc7a

    • SHA256

      5de4bbfa84eae9863915224822cd1bf6ba99521569857d317cd153f43746da2f

    • SHA512

      1d0baa092231fa5f8b85f81e51f4bcdeff2c0d699b8d6a3864a9076360b64ce1c8c0e65b83c379292bbe36bc340b6a4ecb66c4caa7a0315886628a907380e689

    • SSDEEP

      3072:mZxATx98i3T53juFotRia4WPw0Ukin8iA8Ve3f7R5Pk7LgrsvYfqo:mQTD8i3Juk0aXPw5rApvN5Pk/gqR

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks