General

  • Target

    848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118

  • Size

    311KB

  • Sample

    241101-v7vbyatekp

  • MD5

    848b6f16268a4310dd00bf70baafbc4b

  • SHA1

    9ede0b362fc7906a8373ca12145e5300c6fd35a0

  • SHA256

    dc28cc690a11b1394a0a9f104c84da5787b5b25db0c5fd00eb87f83048372635

  • SHA512

    27c7342c9d57f34ca564fa44ea1301eeffc3c19aff2eb19dba8f1146808c0f5e4eedf3becfcb4bee780021062e1372aa43708d783afa863303e0a7a3a3158a23

  • SSDEEP

    6144:/PHzVTnDQkkOZQv/xWs/0fvD281W1gWRknOUmXC3gxoimLjK8:/PHzV7DzOvJWs/0fva8dHYRxoiSz

Score
7/10

Malware Config

Targets

    • Target

      848b6f16268a4310dd00bf70baafbc4b_JaffaCakes118

    • Size

      311KB

    • MD5

      848b6f16268a4310dd00bf70baafbc4b

    • SHA1

      9ede0b362fc7906a8373ca12145e5300c6fd35a0

    • SHA256

      dc28cc690a11b1394a0a9f104c84da5787b5b25db0c5fd00eb87f83048372635

    • SHA512

      27c7342c9d57f34ca564fa44ea1301eeffc3c19aff2eb19dba8f1146808c0f5e4eedf3becfcb4bee780021062e1372aa43708d783afa863303e0a7a3a3158a23

    • SSDEEP

      6144:/PHzVTnDQkkOZQv/xWs/0fvD281W1gWRknOUmXC3gxoimLjK8:/PHzV7DzOvJWs/0fva8dHYRxoiSz

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks