General

  • Target

    52d2292b8b918c90e71371c217266708_JaffaCakes118

  • Size

    35KB

  • Sample

    241017-vwlweszbnr

  • MD5

    52d2292b8b918c90e71371c217266708

  • SHA1

    97949c2df026a011093c0d7aaf8528b987c54583

  • SHA256

    d8588aa9d226e3e44b281d2440bdf1f2e510ddd182d49f887087e0af28c82486

  • SHA512

    1a85d8d7b87a6eb478685da6dcc893af75e02a191e2a3aac776f20a7da493cb91a330aea5a544e0cef61f265b2e9186c5b227027e60ebb14802cc8f9272d00e6

  • SSDEEP

    384:x9RlQG13BLgexxxaR0O834rfmAT/5bcicoAVmaqsj7T0oY7cQ67oJk1Ziwf6hycb:TQGpmes+olciha/sw8cF6srxLwN97jB

Score
7/10

Malware Config

Targets

    • Target

      52d2292b8b918c90e71371c217266708_JaffaCakes118

    • Size

      35KB

    • MD5

      52d2292b8b918c90e71371c217266708

    • SHA1

      97949c2df026a011093c0d7aaf8528b987c54583

    • SHA256

      d8588aa9d226e3e44b281d2440bdf1f2e510ddd182d49f887087e0af28c82486

    • SHA512

      1a85d8d7b87a6eb478685da6dcc893af75e02a191e2a3aac776f20a7da493cb91a330aea5a544e0cef61f265b2e9186c5b227027e60ebb14802cc8f9272d00e6

    • SSDEEP

      384:x9RlQG13BLgexxxaR0O834rfmAT/5bcicoAVmaqsj7T0oY7cQ67oJk1Ziwf6hycb:TQGpmes+olciha/sw8cF6srxLwN97jB

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks