General

  • Target

    f66da4dac9a5e3aff3f777436eaa51b0_JaffaCakes118

  • Size

    24KB

  • Sample

    240925-t6m1sswapm

  • MD5

    f66da4dac9a5e3aff3f777436eaa51b0

  • SHA1

    d6c086899e9fd10688fe70e2f84b591775f6bc32

  • SHA256

    da20c00b996d90ba1791f0247b643f9a907f0e85358421cf5496e94a905f983b

  • SHA512

    5e4955a661ff8f34d863233fb3366c0a12cc4a4cc224ad8a1f3dc7a0e7caac2b73f3328cd893dda385a66e6541560cd5f4150d95ae2e6ccc18eaea911bc81b92

  • SSDEEP

    384:l3jVKzOo+mhRM/WShMOzX9A9O1u4zU/U+nqcbzgpV0RukrhI0:LKyo+mhyOSryZxFnS4PK

Score
7/10

Malware Config

Targets

    • Target

      f66da4dac9a5e3aff3f777436eaa51b0_JaffaCakes118

    • Size

      24KB

    • MD5

      f66da4dac9a5e3aff3f777436eaa51b0

    • SHA1

      d6c086899e9fd10688fe70e2f84b591775f6bc32

    • SHA256

      da20c00b996d90ba1791f0247b643f9a907f0e85358421cf5496e94a905f983b

    • SHA512

      5e4955a661ff8f34d863233fb3366c0a12cc4a4cc224ad8a1f3dc7a0e7caac2b73f3328cd893dda385a66e6541560cd5f4150d95ae2e6ccc18eaea911bc81b92

    • SSDEEP

      384:l3jVKzOo+mhRM/WShMOzX9A9O1u4zU/U+nqcbzgpV0RukrhI0:LKyo+mhyOSryZxFnS4PK

    Score
    7/10
    • Deletes itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks