General

  • Target

    15e028e440787d71611c3416150f9080_JaffaCakes118

  • Size

    112KB

  • Sample

    241005-dc91ga1ell

  • MD5

    15e028e440787d71611c3416150f9080

  • SHA1

    73aaead99a530e2f2bdaa2d0d5b7677e6e20f5bf

  • SHA256

    79d250430ef767889bf88bfade773b4483290154957aee02169dc62c1b806da8

  • SHA512

    42cdcf98eb1ff19733312a0e33dcd452a912d0c63b4712f1d754b3eb2c7da648d03492191192b20289660c9e396b9f6904e8533fb0b4d776f95fccfbb472b12c

  • SSDEEP

    1536:zg1YdvCdd4jKHq5lkMjYrklQIBqCFd/C4IuVR+tOK2weaz:U1oMd4juqzPjY4SIBDFpC4/RHwX

Score
8/10

Malware Config

Targets

    • Target

      15e028e440787d71611c3416150f9080_JaffaCakes118

    • Size

      112KB

    • MD5

      15e028e440787d71611c3416150f9080

    • SHA1

      73aaead99a530e2f2bdaa2d0d5b7677e6e20f5bf

    • SHA256

      79d250430ef767889bf88bfade773b4483290154957aee02169dc62c1b806da8

    • SHA512

      42cdcf98eb1ff19733312a0e33dcd452a912d0c63b4712f1d754b3eb2c7da648d03492191192b20289660c9e396b9f6904e8533fb0b4d776f95fccfbb472b12c

    • SSDEEP

      1536:zg1YdvCdd4jKHq5lkMjYrklQIBqCFd/C4IuVR+tOK2weaz:U1oMd4juqzPjY4SIBDFpC4/RHwX

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks