General

  • Target

    2c7e505942e782c24536e3cbe8084315_JaffaCakes118

  • Size

    92KB

  • Sample

    241009-g9nehsydnq

  • MD5

    2c7e505942e782c24536e3cbe8084315

  • SHA1

    fe00105126201dcec426a3b21f5b248774d137cf

  • SHA256

    a47a1591beef4b4c78b94b2a61fa249a1b65d11b500e5421ad5e4e57c6e02cb7

  • SHA512

    7b28cb48a69dd8d79bedd8d199f0a312725bdd1d39b565b83a43b462447ac0563b0cbc749eaf3c11f885f948c522827b5e237b7643099b0639cc319af12d60fe

  • SSDEEP

    1536:jM0gNI+RqihfQxtQg1nhFc9pJpk+tCwmg+Q6buWkJ2/tnJs1v8pEekNEkpYA0F:jMbI+RFQxjJGJpTP65vFLGjNE59

Score
7/10

Malware Config

Targets

    • Target

      2c7e505942e782c24536e3cbe8084315_JaffaCakes118

    • Size

      92KB

    • MD5

      2c7e505942e782c24536e3cbe8084315

    • SHA1

      fe00105126201dcec426a3b21f5b248774d137cf

    • SHA256

      a47a1591beef4b4c78b94b2a61fa249a1b65d11b500e5421ad5e4e57c6e02cb7

    • SHA512

      7b28cb48a69dd8d79bedd8d199f0a312725bdd1d39b565b83a43b462447ac0563b0cbc749eaf3c11f885f948c522827b5e237b7643099b0639cc319af12d60fe

    • SSDEEP

      1536:jM0gNI+RqihfQxtQg1nhFc9pJpk+tCwmg+Q6buWkJ2/tnJs1v8pEekNEkpYA0F:jMbI+RFQxjJGJpTP65vFLGjNE59

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks