General

  • Target

    d34094a5a1112f340ba0a3df1cefc1f8_JaffaCakes118

  • Size

    38KB

  • Sample

    240908-b2zjxsxdkk

  • MD5

    d34094a5a1112f340ba0a3df1cefc1f8

  • SHA1

    860a9e375a2719a4bc19864677a6b57f45cf0bfc

  • SHA256

    fb485934d1a2d3e9f49b4e0078d9f257d1a608c85c7c0c6282d0fa51906ee717

  • SHA512

    d037bf7799d40436df5f417387f595be89ce7a6b8b927fd3a64cf5df1941a43b36769610f06744a073f2755008f3832994d6a7121b892b520fca92264813a2f2

  • SSDEEP

    768:objqEFd8yMaZaqj+DQxHedPYy16QVWAGYqr55uuWc:Q/xauaE+2wxWJYMPuux

Score
7/10

Malware Config

Targets

    • Target

      d34094a5a1112f340ba0a3df1cefc1f8_JaffaCakes118

    • Size

      38KB

    • MD5

      d34094a5a1112f340ba0a3df1cefc1f8

    • SHA1

      860a9e375a2719a4bc19864677a6b57f45cf0bfc

    • SHA256

      fb485934d1a2d3e9f49b4e0078d9f257d1a608c85c7c0c6282d0fa51906ee717

    • SHA512

      d037bf7799d40436df5f417387f595be89ce7a6b8b927fd3a64cf5df1941a43b36769610f06744a073f2755008f3832994d6a7121b892b520fca92264813a2f2

    • SSDEEP

      768:objqEFd8yMaZaqj+DQxHedPYy16QVWAGYqr55uuWc:Q/xauaE+2wxWJYMPuux

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks