General

  • Target

    15eef604313e0e3e9d79b14d0e662b62_JaffaCakes118

  • Size

    235KB

  • Sample

    241005-dpfbmawerf

  • MD5

    15eef604313e0e3e9d79b14d0e662b62

  • SHA1

    3a7e208bed22446c3cf351fa630a740bc8eaf63b

  • SHA256

    349f93550a061292b1f930af7eb15301091da150bcaf34a781acf3c39febf8ac

  • SHA512

    1e1d4cef324de6814489d1b26aba18a76787ab237ac9f5d9d29b1f398f577d3a7f6c9d768cbc84b6575551df318ce97c963ba39ffa9af5fe33c5641f1ce2d335

  • SSDEEP

    6144:govFwM12NoLHwr/3Cl0lAmoamFdhyHJf:giFENoLE6lhmGXYJ

Malware Config

Targets

    • Target

      15eef604313e0e3e9d79b14d0e662b62_JaffaCakes118

    • Size

      235KB

    • MD5

      15eef604313e0e3e9d79b14d0e662b62

    • SHA1

      3a7e208bed22446c3cf351fa630a740bc8eaf63b

    • SHA256

      349f93550a061292b1f930af7eb15301091da150bcaf34a781acf3c39febf8ac

    • SHA512

      1e1d4cef324de6814489d1b26aba18a76787ab237ac9f5d9d29b1f398f577d3a7f6c9d768cbc84b6575551df318ce97c963ba39ffa9af5fe33c5641f1ce2d335

    • SSDEEP

      6144:govFwM12NoLHwr/3Cl0lAmoamFdhyHJf:giFENoLE6lhmGXYJ

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks