General

  • Target

    d245acab2c12c3658f84248ddffd2381_JaffaCakes118

  • Size

    92KB

  • Sample

    240907-s3z1hsshrh

  • MD5

    d245acab2c12c3658f84248ddffd2381

  • SHA1

    141915842559ed9b436f0deac509e70f4d767da5

  • SHA256

    fc7fe63fd2685189fd2aef7481e0244a1278bed231b940f85264382a913d6524

  • SHA512

    c3f9030b7091b16ca35abcd54fb5c93f339aa80a02cfcfb710145d88ed96a6d24bbaecbec9404857d359cc48a8a39221fac024f6d52ed1547af1e167a57d332f

  • SSDEEP

    1536:W7FDGo4K9Ty+ihfQxtQg1nhFc9pJpk+tCwmg+Q6buWkJ2/tnJs1vk1PsG4evCuJ4:yDGACQxjJGJpTP65vFJOEvCa4

Score
7/10

Malware Config

Targets

    • Target

      d245acab2c12c3658f84248ddffd2381_JaffaCakes118

    • Size

      92KB

    • MD5

      d245acab2c12c3658f84248ddffd2381

    • SHA1

      141915842559ed9b436f0deac509e70f4d767da5

    • SHA256

      fc7fe63fd2685189fd2aef7481e0244a1278bed231b940f85264382a913d6524

    • SHA512

      c3f9030b7091b16ca35abcd54fb5c93f339aa80a02cfcfb710145d88ed96a6d24bbaecbec9404857d359cc48a8a39221fac024f6d52ed1547af1e167a57d332f

    • SSDEEP

      1536:W7FDGo4K9Ty+ihfQxtQg1nhFc9pJpk+tCwmg+Q6buWkJ2/tnJs1vk1PsG4evCuJ4:yDGACQxjJGJpTP65vFJOEvCa4

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks