General

  • Target

    be65ed21e0a1409a90a487e7622ce06e_JaffaCakes118

  • Size

    137KB

  • Sample

    240824-mgk2ksxdnm

  • MD5

    be65ed21e0a1409a90a487e7622ce06e

  • SHA1

    dd877dd25ac6107f3d1194ae1aa4509481dffa01

  • SHA256

    083d772776f699f4ed6720b29f608e4f9b425fcf8fce8fd9a6a75c0ab3a544ee

  • SHA512

    3d7bad0641f6c12cef4c897fcc09669370ab41c614efa48e5729d117f74f91a74f0081bc1755e3f674f79edf54f73d83fce6ce037b4ba29e25a119c74d53a881

  • SSDEEP

    3072:qtT8HbO3YH9sLZ2I6UdSpP08dezPj6IKnPRT9CUPLX4a:TQRIIRda8JqIERToUPL

Score
7/10

Malware Config

Targets

    • Target

      be65ed21e0a1409a90a487e7622ce06e_JaffaCakes118

    • Size

      137KB

    • MD5

      be65ed21e0a1409a90a487e7622ce06e

    • SHA1

      dd877dd25ac6107f3d1194ae1aa4509481dffa01

    • SHA256

      083d772776f699f4ed6720b29f608e4f9b425fcf8fce8fd9a6a75c0ab3a544ee

    • SHA512

      3d7bad0641f6c12cef4c897fcc09669370ab41c614efa48e5729d117f74f91a74f0081bc1755e3f674f79edf54f73d83fce6ce037b4ba29e25a119c74d53a881

    • SSDEEP

      3072:qtT8HbO3YH9sLZ2I6UdSpP08dezPj6IKnPRT9CUPLX4a:TQRIIRda8JqIERToUPL

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks