General

  • Target

    adcf7571839be68dbd69afaaa54b0427_JaffaCakes118

  • Size

    195KB

  • Sample

    240820-eqjwwasgmb

  • MD5

    adcf7571839be68dbd69afaaa54b0427

  • SHA1

    d0ed375055bd03bc6ad691727bd92f79dfd9b121

  • SHA256

    96e3eca2eae3b8c34bdc42c689edfc4ca396ee66a594e129698d6f0bebb8fa7f

  • SHA512

    840c6328b8f4ac4f0a89a7249503bae2fc70be2660bbd7a97a2851a528f1230a5ce5d5f6be99c6f5c703f22716a6719317b2dc66607266a97e91c0fab77b4e43

  • SSDEEP

    6144:tNIe66lfkdCVvi8nX4kN/JMLkqo9E6gW2C3cI04:t9xlfkdQvRnV/JM5o9E6WC350

Score
7/10

Malware Config

Targets

    • Target

      adcf7571839be68dbd69afaaa54b0427_JaffaCakes118

    • Size

      195KB

    • MD5

      adcf7571839be68dbd69afaaa54b0427

    • SHA1

      d0ed375055bd03bc6ad691727bd92f79dfd9b121

    • SHA256

      96e3eca2eae3b8c34bdc42c689edfc4ca396ee66a594e129698d6f0bebb8fa7f

    • SHA512

      840c6328b8f4ac4f0a89a7249503bae2fc70be2660bbd7a97a2851a528f1230a5ce5d5f6be99c6f5c703f22716a6719317b2dc66607266a97e91c0fab77b4e43

    • SSDEEP

      6144:tNIe66lfkdCVvi8nX4kN/JMLkqo9E6gW2C3cI04:t9xlfkdQvRnV/JM5o9E6WC350

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks