General

  • Target

    3a87f5d69988c13fa1994d61be888c69_JaffaCakes118

  • Size

    38KB

  • Sample

    241012-rwkftazcqr

  • MD5

    3a87f5d69988c13fa1994d61be888c69

  • SHA1

    c49a05211b7e506a4ac37078b0e72a4c9560e628

  • SHA256

    e015e7513c231d7cb71d37c0cd979ee752236e418f1420d504f99a894bf86837

  • SHA512

    a6fb109327611206c9258493bc01457e5da3fad9f0df56f175474fae836255a105c5816f9284479c29ed2482ee6a11ab5d5b1b7d456a8591b6a138f2500c4359

  • SSDEEP

    768:objqEFd8yMaZaqj+DQxHedPYy16QVWAGYqr55uuWN:Q/xauaE+2wxWJYMPuuk

Score
7/10

Malware Config

Targets

    • Target

      3a87f5d69988c13fa1994d61be888c69_JaffaCakes118

    • Size

      38KB

    • MD5

      3a87f5d69988c13fa1994d61be888c69

    • SHA1

      c49a05211b7e506a4ac37078b0e72a4c9560e628

    • SHA256

      e015e7513c231d7cb71d37c0cd979ee752236e418f1420d504f99a894bf86837

    • SHA512

      a6fb109327611206c9258493bc01457e5da3fad9f0df56f175474fae836255a105c5816f9284479c29ed2482ee6a11ab5d5b1b7d456a8591b6a138f2500c4359

    • SSDEEP

      768:objqEFd8yMaZaqj+DQxHedPYy16QVWAGYqr55uuWN:Q/xauaE+2wxWJYMPuuk

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks