General

  • Target

    b922276eb5ba5769814225fbe103f6aa_JaffaCakes118

  • Size

    216KB

  • Sample

    240822-zvyaaazfpn

  • MD5

    b922276eb5ba5769814225fbe103f6aa

  • SHA1

    1f5d608c63ca12f5ce861d2687cdf28d03a81822

  • SHA256

    c06e904e12c327e1eb9741063f8ddd514f0982e180b55098d2b69871605b1c35

  • SHA512

    03fe9f5cf5c94343c6144ea108f516909d89285b72d92ecf15e94d8183ab8ff4c10d2a6c01a1558c00ca5312d8d610296659a8631c9fbaaacaa8da4c315d4587

  • SSDEEP

    6144:d0u0gQzha+4Vypbkhc1RvOTDkNiCUJvE2C:p0rzv4YpbN1cDYiLhRC

Score
7/10

Malware Config

Targets

    • Target

      b922276eb5ba5769814225fbe103f6aa_JaffaCakes118

    • Size

      216KB

    • MD5

      b922276eb5ba5769814225fbe103f6aa

    • SHA1

      1f5d608c63ca12f5ce861d2687cdf28d03a81822

    • SHA256

      c06e904e12c327e1eb9741063f8ddd514f0982e180b55098d2b69871605b1c35

    • SHA512

      03fe9f5cf5c94343c6144ea108f516909d89285b72d92ecf15e94d8183ab8ff4c10d2a6c01a1558c00ca5312d8d610296659a8631c9fbaaacaa8da4c315d4587

    • SSDEEP

      6144:d0u0gQzha+4Vypbkhc1RvOTDkNiCUJvE2C:p0rzv4YpbN1cDYiLhRC

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks