General

  • Target

    db44f5d0677c0ce88ada0034afbec0b2_JaffaCakes118

  • Size

    172KB

  • Sample

    240911-1la9tsvdqf

  • MD5

    db44f5d0677c0ce88ada0034afbec0b2

  • SHA1

    74dda14e9e4ff68b41bd77624387da47c54e7123

  • SHA256

    59013f257a1af905cdd2f02b16ea4bf22c95197094ed81d125791099c78d6180

  • SHA512

    ed1de823cfd977fd017834ee7d2d8ee10746310322d6cb97925090974c7192a1376e01beb472565e026f31f6348616d206919cab259edad900a769411dda53a9

  • SSDEEP

    3072:+QT7Rt1LirDrLSwety8argLVCKJ4YsbvsEqY+pwTHWCu6yqcCvQgJj6B:5T7RtlAqtyNrfKJ4FbvsEAyr3yHCvQgg

Score
7/10

Malware Config

Targets

    • Target

      db44f5d0677c0ce88ada0034afbec0b2_JaffaCakes118

    • Size

      172KB

    • MD5

      db44f5d0677c0ce88ada0034afbec0b2

    • SHA1

      74dda14e9e4ff68b41bd77624387da47c54e7123

    • SHA256

      59013f257a1af905cdd2f02b16ea4bf22c95197094ed81d125791099c78d6180

    • SHA512

      ed1de823cfd977fd017834ee7d2d8ee10746310322d6cb97925090974c7192a1376e01beb472565e026f31f6348616d206919cab259edad900a769411dda53a9

    • SSDEEP

      3072:+QT7Rt1LirDrLSwety8argLVCKJ4YsbvsEqY+pwTHWCu6yqcCvQgJj6B:5T7RtlAqtyNrfKJ4FbvsEAyr3yHCvQgg

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks