General

  • Target

    ff2107f6c1c9944eb8786e29b4d33bd8_JaffaCakes118

  • Size

    280KB

  • Sample

    240929-w7glhsyfph

  • MD5

    ff2107f6c1c9944eb8786e29b4d33bd8

  • SHA1

    4222dce5474016822cd0dab6293c0f11b88a330d

  • SHA256

    3c1dc0ded20bd442128682872cbe2679b6d1dde1896805ec7d16f8f009ba5525

  • SHA512

    e45f06676e9b24a5b4273c882043d922408954eeff4775f5c31e2699005ec67911b05c8096b50f38feec23bf474e5e2f33984f465daef8d3b1e85d71a0d14ba0

  • SSDEEP

    6144:mwYp93UiKXkpvcEkFJ79gMXWuRGw+6tXGM/zJ1HthtYrXCPl:qUQpvcEGx9gM3P+6tXNrJ1NSy9

Score
6/10

Malware Config

Targets

    • Target

      ff2107f6c1c9944eb8786e29b4d33bd8_JaffaCakes118

    • Size

      280KB

    • MD5

      ff2107f6c1c9944eb8786e29b4d33bd8

    • SHA1

      4222dce5474016822cd0dab6293c0f11b88a330d

    • SHA256

      3c1dc0ded20bd442128682872cbe2679b6d1dde1896805ec7d16f8f009ba5525

    • SHA512

      e45f06676e9b24a5b4273c882043d922408954eeff4775f5c31e2699005ec67911b05c8096b50f38feec23bf474e5e2f33984f465daef8d3b1e85d71a0d14ba0

    • SSDEEP

      6144:mwYp93UiKXkpvcEkFJ79gMXWuRGw+6tXGM/zJ1HthtYrXCPl:qUQpvcEGx9gM3P+6tXNrJ1NSy9

    Score
    6/10
    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks