General

  • Target

    eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118

  • Size

    36KB

  • Sample

    240919-hgglyavhlf

  • MD5

    eac7abba08b0aaf1fc023206d87a1cca

  • SHA1

    a2f7da758cd02609dff4421e8e3517436905cbfe

  • SHA256

    a4da95f01c1260c180c5a498cf5bc29f04d3e04fe7f6319d57627a31299a712b

  • SHA512

    4bc57d37150ebe6f238de8eeb3b7803a082736f923e27eee115a1af00dc56e370c25ff4fc81e7da181d55658fe8c087a097c782525babf3236b8461a224fa091

  • SSDEEP

    768:L5uhMogHxJ5CVpm6jFHd+mc+8MfIsVNwDhqpsqx:9FoglCVBjdqz9Nwpp

Score
7/10

Malware Config

Targets

    • Target

      eac7abba08b0aaf1fc023206d87a1cca_JaffaCakes118

    • Size

      36KB

    • MD5

      eac7abba08b0aaf1fc023206d87a1cca

    • SHA1

      a2f7da758cd02609dff4421e8e3517436905cbfe

    • SHA256

      a4da95f01c1260c180c5a498cf5bc29f04d3e04fe7f6319d57627a31299a712b

    • SHA512

      4bc57d37150ebe6f238de8eeb3b7803a082736f923e27eee115a1af00dc56e370c25ff4fc81e7da181d55658fe8c087a097c782525babf3236b8461a224fa091

    • SSDEEP

      768:L5uhMogHxJ5CVpm6jFHd+mc+8MfIsVNwDhqpsqx:9FoglCVBjdqz9Nwpp

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks