General

  • Target

    fa019d8a7139062f4636767fbcce8915_JaffaCakes118

  • Size

    49KB

  • Sample

    240419-lfktradg38

  • MD5

    fa019d8a7139062f4636767fbcce8915

  • SHA1

    1dd1da89e75c3ed1f35ea4129f215548834ece29

  • SHA256

    41cd725357f8b828ad838b2d8aca193c157509d44e2aca133ce0f5eb95434212

  • SHA512

    c5f7f5742624fd806dba46d41e062655ee879aee53a909321d143cbe6c4b25a988cb71f336b6c69eeb53af7a5887da0124fc9b319f94bca9a7aa72986c569ff9

  • SSDEEP

    768:I8RS0QW1/vJrgI7nLq/diPRtDLGdzHEZSlFKq7IqFQXAF2C2bTGPYu4f:mAZfa/QDLGeAlB7pFgbbWG

Score
7/10

Malware Config

Targets

    • Target

      fa019d8a7139062f4636767fbcce8915_JaffaCakes118

    • Size

      49KB

    • MD5

      fa019d8a7139062f4636767fbcce8915

    • SHA1

      1dd1da89e75c3ed1f35ea4129f215548834ece29

    • SHA256

      41cd725357f8b828ad838b2d8aca193c157509d44e2aca133ce0f5eb95434212

    • SHA512

      c5f7f5742624fd806dba46d41e062655ee879aee53a909321d143cbe6c4b25a988cb71f336b6c69eeb53af7a5887da0124fc9b319f94bca9a7aa72986c569ff9

    • SSDEEP

      768:I8RS0QW1/vJrgI7nLq/diPRtDLGdzHEZSlFKq7IqFQXAF2C2bTGPYu4f:mAZfa/QDLGeAlB7pFgbbWG

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks