General

  • Target

    c222df555cbf9aa15b6f7eaed0058e11_JaffaCakes118

  • Size

    216KB

  • Sample

    240826-dbxzhssdnm

  • MD5

    c222df555cbf9aa15b6f7eaed0058e11

  • SHA1

    dabf996db07a6e07a9ba1f288e3125c4a083a73e

  • SHA256

    6b29a715b672424bcb72922cf5f35d9ed0d3ccf8329cd09b9aa1e543743e6ab9

  • SHA512

    51da7bedf2d985edfbab9f25b26fce4101eff75b7e1bb7595aa10b7f69a8ac01331865f5fbf2be6c7a54ed311a6b48a754e322c983c241f076f2a29011307d67

  • SSDEEP

    6144:4sYzVCyuasshciAURsqqRGU7Wu4I0Z/xb:4sGCygsCURsqqL30Z/l

Score
7/10

Malware Config

Targets

    • Target

      c222df555cbf9aa15b6f7eaed0058e11_JaffaCakes118

    • Size

      216KB

    • MD5

      c222df555cbf9aa15b6f7eaed0058e11

    • SHA1

      dabf996db07a6e07a9ba1f288e3125c4a083a73e

    • SHA256

      6b29a715b672424bcb72922cf5f35d9ed0d3ccf8329cd09b9aa1e543743e6ab9

    • SHA512

      51da7bedf2d985edfbab9f25b26fce4101eff75b7e1bb7595aa10b7f69a8ac01331865f5fbf2be6c7a54ed311a6b48a754e322c983c241f076f2a29011307d67

    • SSDEEP

      6144:4sYzVCyuasshciAURsqqRGU7Wu4I0Z/xb:4sGCygsCURsqqL30Z/l

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks