General

  • Target

    fa5e370eecbfcf169247fa795f92a811_JaffaCakes118

  • Size

    837KB

  • Sample

    240927-n61zrs1gjm

  • MD5

    fa5e370eecbfcf169247fa795f92a811

  • SHA1

    abed492eafd448870fe1e9bb9af9ce5d5cfe48e0

  • SHA256

    1db9cccd28e005ff39e5cc132074d15ab423c1a8ef6483a3b0013348c4c23bf9

  • SHA512

    1b78429766639559d152f711d76b70ee2bca16ee85a6f89bd1917e189e5e03d446f4c32f4eae1edb78589e15d4d3654c4e7ef63453e976a4f36ca1e406609947

  • SSDEEP

    24576:fwrseJBZOEvCHcDkhWzSGOy8vsIiPS/Z5r4B32:nelO7cI0zSfyC2Yrz

Score
8/10

Malware Config

Targets

    • Target

      fa5e370eecbfcf169247fa795f92a811_JaffaCakes118

    • Size

      837KB

    • MD5

      fa5e370eecbfcf169247fa795f92a811

    • SHA1

      abed492eafd448870fe1e9bb9af9ce5d5cfe48e0

    • SHA256

      1db9cccd28e005ff39e5cc132074d15ab423c1a8ef6483a3b0013348c4c23bf9

    • SHA512

      1b78429766639559d152f711d76b70ee2bca16ee85a6f89bd1917e189e5e03d446f4c32f4eae1edb78589e15d4d3654c4e7ef63453e976a4f36ca1e406609947

    • SSDEEP

      24576:fwrseJBZOEvCHcDkhWzSGOy8vsIiPS/Z5r4B32:nelO7cI0zSfyC2Yrz

    Score
    8/10
    • Blocklisted process makes network request

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks