General

  • Target

    dcc2278f45f34bff2e95e9a0d6d914df_JaffaCakes118

  • Size

    39KB

  • Sample

    240912-wkwf6awgmm

  • MD5

    dcc2278f45f34bff2e95e9a0d6d914df

  • SHA1

    b207f2b06f35757cff6f6c37a1dae6d71685b74e

  • SHA256

    d7c7dd8faef29df6723e0069803292600145bb9fe74c809e189619a884f6d8f7

  • SHA512

    85bad03309064f028868ef1cc063f4460bbce82d4896a2f0071c3993be38958d3a13e975f76486d92438f13a947f823b8025eeeb17539a62cbc9e240d1b1f223

  • SSDEEP

    768:40DNkaTpkcxgrFFh10xA2NDaiOkI8IfAyu69mKaj/tYaUB9oP:40DmaTpPgZFP0xAIOD8rwmKDah

Score
7/10

Malware Config

Targets

    • Target

      dcc2278f45f34bff2e95e9a0d6d914df_JaffaCakes118

    • Size

      39KB

    • MD5

      dcc2278f45f34bff2e95e9a0d6d914df

    • SHA1

      b207f2b06f35757cff6f6c37a1dae6d71685b74e

    • SHA256

      d7c7dd8faef29df6723e0069803292600145bb9fe74c809e189619a884f6d8f7

    • SHA512

      85bad03309064f028868ef1cc063f4460bbce82d4896a2f0071c3993be38958d3a13e975f76486d92438f13a947f823b8025eeeb17539a62cbc9e240d1b1f223

    • SSDEEP

      768:40DNkaTpkcxgrFFh10xA2NDaiOkI8IfAyu69mKaj/tYaUB9oP:40DmaTpPgZFP0xAIOD8rwmKDah

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks