General

  • Target

    be16d5b2565de5fe7b2e2f060841c15f_JaffaCakes118

  • Size

    37KB

  • Sample

    240824-hlfv7szekp

  • MD5

    be16d5b2565de5fe7b2e2f060841c15f

  • SHA1

    61e087134b426f74f7b81429971a804fe14928f1

  • SHA256

    16b2af1d2448bb6117cb906958971edfd12ed1dcb1aec34ce0ececa7f135e741

  • SHA512

    d649d2882ba524e0011f45b1a6cabdf93badcf0b3feb5c940249e7c9af664803f75d3d81af65517bbd12dbedb1e1067034d24e88557dd88e7667d280c9be06bd

  • SSDEEP

    768:edIZ/alwuAknNWuCMQpb0ruFm1YqTrmHwbLyMyH:edILlknNU4rOobbLynH

Score
7/10

Malware Config

Targets

    • Target

      be16d5b2565de5fe7b2e2f060841c15f_JaffaCakes118

    • Size

      37KB

    • MD5

      be16d5b2565de5fe7b2e2f060841c15f

    • SHA1

      61e087134b426f74f7b81429971a804fe14928f1

    • SHA256

      16b2af1d2448bb6117cb906958971edfd12ed1dcb1aec34ce0ececa7f135e741

    • SHA512

      d649d2882ba524e0011f45b1a6cabdf93badcf0b3feb5c940249e7c9af664803f75d3d81af65517bbd12dbedb1e1067034d24e88557dd88e7667d280c9be06bd

    • SSDEEP

      768:edIZ/alwuAknNWuCMQpb0ruFm1YqTrmHwbLyMyH:edILlknNU4rOobbLynH

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks