General

  • Target

    d33473f72608e48392a647b047d05ac0_JaffaCakes118

  • Size

    1015KB

  • Sample

    240908-bhq4fayapb

  • MD5

    d33473f72608e48392a647b047d05ac0

  • SHA1

    6964ab70809f53a05603b5c8b7810776c8e0e66c

  • SHA256

    136df15647d00bc631e1e398c91310c918e44fb910a93373fe29cd8aec0baba5

  • SHA512

    de91bad9cc55ab85b35ff0d053887325dc71ccdea191982d5b3ae6ad3cb0e8cf4bc61954b3c87dbdd5581323f64ffe813ec229b06962b975d667a1f405c48269

  • SSDEEP

    24576:KUTIcxlECxghXU6C18/SzVckJTxtMN6Jr2lBfYhUOcpupWDNp7iV5:KUJx22zxhckJTxSNc1h9WyS7G

Score
7/10

Malware Config

Targets

    • Target

      d33473f72608e48392a647b047d05ac0_JaffaCakes118

    • Size

      1015KB

    • MD5

      d33473f72608e48392a647b047d05ac0

    • SHA1

      6964ab70809f53a05603b5c8b7810776c8e0e66c

    • SHA256

      136df15647d00bc631e1e398c91310c918e44fb910a93373fe29cd8aec0baba5

    • SHA512

      de91bad9cc55ab85b35ff0d053887325dc71ccdea191982d5b3ae6ad3cb0e8cf4bc61954b3c87dbdd5581323f64ffe813ec229b06962b975d667a1f405c48269

    • SSDEEP

      24576:KUTIcxlECxghXU6C18/SzVckJTxtMN6Jr2lBfYhUOcpupWDNp7iV5:KUJx22zxhckJTxSNc1h9WyS7G

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks