General

  • Target

    dea2eea82de5722de369f5e4447f87f7_JaffaCakes118

  • Size

    71KB

  • Sample

    240913-ws1e3s1amr

  • MD5

    dea2eea82de5722de369f5e4447f87f7

  • SHA1

    aec1b45c21e88fab89a266872e7a4d60d167ac0e

  • SHA256

    23bad6478fb4066de29eee5511239e13ac6d215f1a98c43efead9d1b62ffe92a

  • SHA512

    aa8ec33e55d7cb3b4927ae155a354875fd9da8f58d22f779f97a372ddd9834641977f1a5dd183051869d2f2ae0885b7a328d3795a044780c83c7c6d726ea9cdf

  • SSDEEP

    1536:6MTKdJYU4zxN3j7Cy672stRJ971Zr+vzC1kr:fT8JYU4dZj7Cy02stF11+vzxr

Score
7/10

Malware Config

Targets

    • Target

      dea2eea82de5722de369f5e4447f87f7_JaffaCakes118

    • Size

      71KB

    • MD5

      dea2eea82de5722de369f5e4447f87f7

    • SHA1

      aec1b45c21e88fab89a266872e7a4d60d167ac0e

    • SHA256

      23bad6478fb4066de29eee5511239e13ac6d215f1a98c43efead9d1b62ffe92a

    • SHA512

      aa8ec33e55d7cb3b4927ae155a354875fd9da8f58d22f779f97a372ddd9834641977f1a5dd183051869d2f2ae0885b7a328d3795a044780c83c7c6d726ea9cdf

    • SSDEEP

      1536:6MTKdJYU4zxN3j7Cy672stRJ971Zr+vzC1kr:fT8JYU4dZj7Cy02stF11+vzxr

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks