General

  • Target

    04ad3d325016a11314b612524f7f87aa_JaffaCakes118

  • Size

    156KB

  • Sample

    241001-g5x36avelk

  • MD5

    04ad3d325016a11314b612524f7f87aa

  • SHA1

    1d5a1bc1d9e3e3a0cbdc56e83ea8000c4d4e887d

  • SHA256

    5565b8d0c27d836930658fed83b37cc47dd44edbcbf03de66a2b19974f6891e6

  • SHA512

    0a30416a96bbea2e15b4206857a898bae5d1876fb27ba6ed51460d0c7054698e166d1583d95029a44eddb4d1f6aa73fe0ee7f745bc82c5b0d758190b6a123c50

  • SSDEEP

    3072:dD440wdsKfsCM9vd0UkmLSA+ecsM9JcrNclFtZPsVqFJWe3KW+/KXo:dDp0uNM9PjLSQNr6lsVqF9+KX

Malware Config

Targets

    • Target

      04ad3d325016a11314b612524f7f87aa_JaffaCakes118

    • Size

      156KB

    • MD5

      04ad3d325016a11314b612524f7f87aa

    • SHA1

      1d5a1bc1d9e3e3a0cbdc56e83ea8000c4d4e887d

    • SHA256

      5565b8d0c27d836930658fed83b37cc47dd44edbcbf03de66a2b19974f6891e6

    • SHA512

      0a30416a96bbea2e15b4206857a898bae5d1876fb27ba6ed51460d0c7054698e166d1583d95029a44eddb4d1f6aa73fe0ee7f745bc82c5b0d758190b6a123c50

    • SSDEEP

      3072:dD440wdsKfsCM9vd0UkmLSA+ecsM9JcrNclFtZPsVqFJWe3KW+/KXo:dDp0uNM9PjLSQNr6lsVqF9+KX

    • Deletes itself

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks