General

  • Target

    b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118

  • Size

    346KB

  • Sample

    241130-fxmf1symhr

  • MD5

    b4f0f5a249a19d9923f8447d643831ba

  • SHA1

    437ccdbc2e25d6fc8871d21fc63aa39339855c49

  • SHA256

    c0ea5e0293530f6ae8ee61c083d147cc69ca7c81e74ada7a8f2129c0bac43bbe

  • SHA512

    ff8464e1f72a2f7f237f99fb02359c8db58d1991cb5fc49703488d241fe5382ffda20e84542ff8e06d52e159b5722536c980670e1efe1232e8168c3faf8d6fd8

  • SSDEEP

    6144:puzYwKuEcWPawThMeOhMzm5UKaxxmYrNmIAUxRbLIehweJ369AFKaAIqXlIrbH7e:UzYwKuEYUhoMO+xxmYrkwDDV69XtXqXC

Score
7/10

Malware Config

Targets

    • Target

      b4f0f5a249a19d9923f8447d643831ba_JaffaCakes118

    • Size

      346KB

    • MD5

      b4f0f5a249a19d9923f8447d643831ba

    • SHA1

      437ccdbc2e25d6fc8871d21fc63aa39339855c49

    • SHA256

      c0ea5e0293530f6ae8ee61c083d147cc69ca7c81e74ada7a8f2129c0bac43bbe

    • SHA512

      ff8464e1f72a2f7f237f99fb02359c8db58d1991cb5fc49703488d241fe5382ffda20e84542ff8e06d52e159b5722536c980670e1efe1232e8168c3faf8d6fd8

    • SSDEEP

      6144:puzYwKuEcWPawThMeOhMzm5UKaxxmYrNmIAUxRbLIehweJ369AFKaAIqXlIrbH7e:UzYwKuEYUhoMO+xxmYrkwDDV69XtXqXC

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks