General

  • Target

    65df18b1ae5125da1dc4a09416cf9c03_JaffaCakes118

  • Size

    103KB

  • Sample

    241021-hjqydsvfpq

  • MD5

    65df18b1ae5125da1dc4a09416cf9c03

  • SHA1

    a0fbc8977b3271d0ebeda2e1749bf09a9e03ea33

  • SHA256

    711d1d28ad63edd8edb169c37a23c4619fcc50323ef831c5a12ade18fc525d8d

  • SHA512

    5bad1c3e1205f52ee9478c3a53dc7679a6d9010352f1fb444b130e5b2d046d97dd2757c5fb8c980ed38cc748028f2fa0ab0fa80884a009b87a7d0dc9fede9a40

  • SSDEEP

    3072:WCUdl/c4rShS0IewMZxAy0SIsNdNbCSe6Q668:WbP/ceSI0IxMZjfIQbCSZQx8

Malware Config

Targets

    • Target

      Status_DHL_Sendungsverfolgung__29__04__2015___nolp_dhl_lang___De___900394984948_Message_ID0_2015.exe

    • Size

      128KB

    • MD5

      f0df8f109da1ff7a7fd2aed694860ec2

    • SHA1

      300c2b22d46a0a02f24ae0049f1cd8d1f72fa8a6

    • SHA256

      9984b6d248c96601de58dfb8ecfb5dbaeb6d2b38792bd7d9269da1b96e34f97d

    • SHA512

      3da0cbf81f70d414fd9012a2df508c00951d32173deb6cd42691be3949ddb49edd44ab2a64e60b71f243d225413f446c402cc68d6cc01c1e4be1ea7ec81387f6

    • SSDEEP

      3072:TJVdb2IXAr54CS0IewMZx1udPMK3nwb292x7MI7:9rb2Iws0IxMZPulXwbme7M

    • Detect Emotet payload

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks