General

  • Target

    40cef46fb5210733230b6d15bd10c023_JaffaCakes118

  • Size

    16KB

  • Sample

    241013-tl5ecazclj

  • MD5

    40cef46fb5210733230b6d15bd10c023

  • SHA1

    77dabfe416c80bab18d018c53c27ab789f3f12bc

  • SHA256

    522dfd9894646f8efed7e1b87e7262c34ca90269688e494c9e6a4fe0c442db28

  • SHA512

    8a314ffad2c74f53500f3e338fa8968bfec3443b857caa273942f1f380f2d030cb50838bc76b8101126e08186487639b77657fd8482049843518ca82ef13ca3a

  • SSDEEP

    192:4gBR8Umc2b5WAw4kj40HI2agaLnqhREH0BNQKMCaf8TqzBZ9:tR8UfG56dHI2aNDqAH049CDTqzBZ9

Score
8/10

Malware Config

Targets

    • Target

      40cef46fb5210733230b6d15bd10c023_JaffaCakes118

    • Size

      16KB

    • MD5

      40cef46fb5210733230b6d15bd10c023

    • SHA1

      77dabfe416c80bab18d018c53c27ab789f3f12bc

    • SHA256

      522dfd9894646f8efed7e1b87e7262c34ca90269688e494c9e6a4fe0c442db28

    • SHA512

      8a314ffad2c74f53500f3e338fa8968bfec3443b857caa273942f1f380f2d030cb50838bc76b8101126e08186487639b77657fd8482049843518ca82ef13ca3a

    • SSDEEP

      192:4gBR8Umc2b5WAw4kj40HI2agaLnqhREH0BNQKMCaf8TqzBZ9:tR8UfG56dHI2aNDqAH049CDTqzBZ9

    Score
    8/10
    • Drops file in Drivers directory

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks