General

  • Target

    f5872d0822d6722780b8c7968834d102_JaffaCakes118

  • Size

    12KB

  • Sample

    240417-l6jdlsbf69

  • MD5

    f5872d0822d6722780b8c7968834d102

  • SHA1

    a45af00070027ab961267bb718f42b9b7d4da673

  • SHA256

    8364bf90f2076d0c115abd6f1e545209c4e051ff4d5a8e639813b00905f99a3b

  • SHA512

    88bc35bffd9e0d65584ea39521cf3049081ef66d0bcbb5b3136c7f0648dfd5a950edc26dbe816e4913515d9f0efd73f88fdf2988765dadd24003c1abd9b69840

  • SSDEEP

    192:OCfMTmJFxka1g+5dSI/6PRu++LqB2D+K9TjvB29AidBTkWSOu:OCfRFSe+u6PRhtRdBlSL

Score
8/10

Malware Config

Targets

    • Target

      f5872d0822d6722780b8c7968834d102_JaffaCakes118

    • Size

      12KB

    • MD5

      f5872d0822d6722780b8c7968834d102

    • SHA1

      a45af00070027ab961267bb718f42b9b7d4da673

    • SHA256

      8364bf90f2076d0c115abd6f1e545209c4e051ff4d5a8e639813b00905f99a3b

    • SHA512

      88bc35bffd9e0d65584ea39521cf3049081ef66d0bcbb5b3136c7f0648dfd5a950edc26dbe816e4913515d9f0efd73f88fdf2988765dadd24003c1abd9b69840

    • SSDEEP

      192:OCfMTmJFxka1g+5dSI/6PRu++LqB2D+K9TjvB29AidBTkWSOu:OCfRFSe+u6PRhtRdBlSL

    Score
    8/10
    • Modifies AppInit DLL entries

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks