General

  • Target

    cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118

  • Size

    43KB

  • Sample

    240901-bt1f9axcmc

  • MD5

    cdf37bdbb1fd8e9ff085285960649e50

  • SHA1

    a82c5a889e3dd5d1bc19f453ed6bf143cf9c8bb7

  • SHA256

    145a9f820f2b9fbb5589ce32b0a3e69fe50c1de791f633323950b6225293c9a7

  • SHA512

    5c414d9e7092f2ab2520d29442f8d9bc5a37d96ac1a403447b709a59bc6e68fe15163535a433a441dd07268d9b0789170d92eaf966e093336ddbb46513acca4c

  • SSDEEP

    768:sbTqavYjTvEBTfVDAyNX8PFOJ40feIaFzSUqSH3Uxd:sbTqBjT8fhAyF8NKeIaJExd

Score
7/10

Malware Config

Targets

    • Target

      cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118

    • Size

      43KB

    • MD5

      cdf37bdbb1fd8e9ff085285960649e50

    • SHA1

      a82c5a889e3dd5d1bc19f453ed6bf143cf9c8bb7

    • SHA256

      145a9f820f2b9fbb5589ce32b0a3e69fe50c1de791f633323950b6225293c9a7

    • SHA512

      5c414d9e7092f2ab2520d29442f8d9bc5a37d96ac1a403447b709a59bc6e68fe15163535a433a441dd07268d9b0789170d92eaf966e093336ddbb46513acca4c

    • SSDEEP

      768:sbTqavYjTvEBTfVDAyNX8PFOJ40feIaFzSUqSH3Uxd:sbTqBjT8fhAyF8NKeIaJExd

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks