General

  • Target

    01f63136a273542e838db6e6171792f3_JaffaCakes118

  • Size

    377KB

  • Sample

    240930-sfr2dswalg

  • MD5

    01f63136a273542e838db6e6171792f3

  • SHA1

    6f1b836ab719b0f96a3ecb964af09ecc75d94679

  • SHA256

    bc631a9d7b1c637aa9407aed6c23c710a10d59ed3f7c88243e041427ffca0575

  • SHA512

    9a564c50bec2b11d350c0f63b0e93bb21d6a337253f90b9a430ac5baaad171bdd49116fe6b34154c7629542206856c563c54a47380cf1feb8c32a58bc308bb1d

  • SSDEEP

    6144:glZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76llz1SC23lEHWPwyoyxLCf:gHLUMuiv9RgfSjAzRtylzR21E2PXxLCf

Score
5/10

Malware Config

Targets

    • Target

      01f63136a273542e838db6e6171792f3_JaffaCakes118

    • Size

      377KB

    • MD5

      01f63136a273542e838db6e6171792f3

    • SHA1

      6f1b836ab719b0f96a3ecb964af09ecc75d94679

    • SHA256

      bc631a9d7b1c637aa9407aed6c23c710a10d59ed3f7c88243e041427ffca0575

    • SHA512

      9a564c50bec2b11d350c0f63b0e93bb21d6a337253f90b9a430ac5baaad171bdd49116fe6b34154c7629542206856c563c54a47380cf1feb8c32a58bc308bb1d

    • SSDEEP

      6144:glZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76llz1SC23lEHWPwyoyxLCf:gHLUMuiv9RgfSjAzRtylzR21E2PXxLCf

    Score
    5/10
    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks