General

  • Target

    ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118

  • Size

    219KB

  • Sample

    240919-eyyp1a1cpp

  • MD5

    ea93035d6b00148b21b5b1f64f2db9ac

  • SHA1

    45852452126a743a0ad2f49b224618f8fe044eff

  • SHA256

    c23b564b7a2e2991d9268a2aea47f1f8a74deced10d70bfe38077d10793bf8eb

  • SHA512

    6c9f21481368c25e34efac4fd08818dcce99990a83f324ba6731e3cd28a69352989f6da9b3a5ffedc77e348ff21df5b4a9641f812709fcde092920dedb12b8c9

  • SSDEEP

    6144:Rm2OXHGn0zttJzx0bk+n2R5NoubeP6PFj52uZ1+4PgKD:RcXmat/AznY5Nc6CuZJPga

Score
7/10

Malware Config

Targets

    • Target

      ea93035d6b00148b21b5b1f64f2db9ac_JaffaCakes118

    • Size

      219KB

    • MD5

      ea93035d6b00148b21b5b1f64f2db9ac

    • SHA1

      45852452126a743a0ad2f49b224618f8fe044eff

    • SHA256

      c23b564b7a2e2991d9268a2aea47f1f8a74deced10d70bfe38077d10793bf8eb

    • SHA512

      6c9f21481368c25e34efac4fd08818dcce99990a83f324ba6731e3cd28a69352989f6da9b3a5ffedc77e348ff21df5b4a9641f812709fcde092920dedb12b8c9

    • SSDEEP

      6144:Rm2OXHGn0zttJzx0bk+n2R5NoubeP6PFj52uZ1+4PgKD:RcXmat/AznY5Nc6CuZJPga

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks