General

  • Target

    f59f199740185896b3c54ddf2ace6704_JaffaCakes118

  • Size

    124KB

  • Sample

    240925-kk55tawbkq

  • MD5

    f59f199740185896b3c54ddf2ace6704

  • SHA1

    0d1416738f398fe60ff2e68d4c3a620823ce3f9d

  • SHA256

    442450bd008400a6867d0560c22ba883206754a7e9e996f582615a21b43bd09f

  • SHA512

    a7176b8bde8254bf41cda07ca5c4fcbd2e176f7a8e28894f024c3e2d0be234410b0f12c51ca9630bd9f58a772ffbd5794e747cdf2a0dd7feaf6d8c6be9818fc7

  • SSDEEP

    1536:M2kwGMG6qaM0+O3pcF2uZ3Pmcsm4jFQ+rLH3V7OvQT1gJnVMKK1P:M2UMG/avpl23/EJzfH3VCe8HKB

Score
6/10

Malware Config

Targets

    • Target

      f59f199740185896b3c54ddf2ace6704_JaffaCakes118

    • Size

      124KB

    • MD5

      f59f199740185896b3c54ddf2ace6704

    • SHA1

      0d1416738f398fe60ff2e68d4c3a620823ce3f9d

    • SHA256

      442450bd008400a6867d0560c22ba883206754a7e9e996f582615a21b43bd09f

    • SHA512

      a7176b8bde8254bf41cda07ca5c4fcbd2e176f7a8e28894f024c3e2d0be234410b0f12c51ca9630bd9f58a772ffbd5794e747cdf2a0dd7feaf6d8c6be9818fc7

    • SSDEEP

      1536:M2kwGMG6qaM0+O3pcF2uZ3Pmcsm4jFQ+rLH3V7OvQT1gJnVMKK1P:M2UMG/avpl23/EJzfH3VCe8HKB

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks