General

  • Target

    c06edd9c928d267ac9df727443f55448_JaffaCakes118

  • Size

    562KB

  • Sample

    240825-ldff9aydlj

  • MD5

    c06edd9c928d267ac9df727443f55448

  • SHA1

    96e14aa66d4ea3ddd27784b82d2440ed8e2e5f8d

  • SHA256

    a476c6569d6ab92310804d5d1ac6524189d2249d33d0949a0571148730a23cc6

  • SHA512

    22f19d07ac4b071432ce4b63f625f2dcc934c8c7966923f67c6ed14185fd1fc246558f13b77d215a7874d7196cd32344fd8ff04bb6540ffb82fea5cc7b576d8a

  • SSDEEP

    12288:PJM46GJC0PJ9NDkqOMtV5RMEKmSakp8nsQR6i7ijJmz:1LBn/V5RMEK1JQki73z

Score
7/10

Malware Config

Targets

    • Target

      c06edd9c928d267ac9df727443f55448_JaffaCakes118

    • Size

      562KB

    • MD5

      c06edd9c928d267ac9df727443f55448

    • SHA1

      96e14aa66d4ea3ddd27784b82d2440ed8e2e5f8d

    • SHA256

      a476c6569d6ab92310804d5d1ac6524189d2249d33d0949a0571148730a23cc6

    • SHA512

      22f19d07ac4b071432ce4b63f625f2dcc934c8c7966923f67c6ed14185fd1fc246558f13b77d215a7874d7196cd32344fd8ff04bb6540ffb82fea5cc7b576d8a

    • SSDEEP

      12288:PJM46GJC0PJ9NDkqOMtV5RMEKmSakp8nsQR6i7ijJmz:1LBn/V5RMEK1JQki73z

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks