General

  • Target

    4606668ebb936b03e91ddab6a6da9369_JaffaCakes118

  • Size

    1KB

  • Sample

    240330-2hn7ysgg93

  • MD5

    4606668ebb936b03e91ddab6a6da9369

  • SHA1

    f45399b17d39691f7064621b0f44d27aa6e45ae9

  • SHA256

    5cbfb3db12f2047a858c3ac312dde3bcc3159fab137a1366f8a00acf8d3e6c09

  • SHA512

    2ecc1864a68cf8d76f3b1bdd40879455e1c4991bbc49707e1f0d5b148fde8905cc504cfc38cb4575c0d8000ccc567bdfb294fcad64d50a8d563ece35d60ac189

Score
7/10

Malware Config

Targets

    • Target

      4606668ebb936b03e91ddab6a6da9369_JaffaCakes118

    • Size

      1KB

    • MD5

      4606668ebb936b03e91ddab6a6da9369

    • SHA1

      f45399b17d39691f7064621b0f44d27aa6e45ae9

    • SHA256

      5cbfb3db12f2047a858c3ac312dde3bcc3159fab137a1366f8a00acf8d3e6c09

    • SHA512

      2ecc1864a68cf8d76f3b1bdd40879455e1c4991bbc49707e1f0d5b148fde8905cc504cfc38cb4575c0d8000ccc567bdfb294fcad64d50a8d563ece35d60ac189

    Score
    7/10
    • Executes dropped EXE

    • Checks CPU configuration

      Checks CPU information which indicate if the system is a virtual machine.

    • Write file to user bin folder

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Hijack Execution Flow

1
T1574

Privilege Escalation

Hijack Execution Flow

1
T1574

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Hijack Execution Flow

1
T1574

Discovery

Virtualization/Sandbox Evasion

1
T1497

Tasks