General

  • Target

    0c77fd059672554ccff0bc2a9cd1046a_JaffaCakes118

  • Size

    624KB

  • Sample

    240501-wmeleseh78

  • MD5

    0c77fd059672554ccff0bc2a9cd1046a

  • SHA1

    83708b04c63e07cd81c710ebd81e99146454742d

  • SHA256

    114f31f9c1317f121760fafcd257adb7ea48ce41e46a2f526c431b15f2380c54

  • SHA512

    1f6101448cae182e3898f91e977ca23aab67ad605f2fb368c67990f92046fc1b74b730d9f4f70aac48c95bf466921b92c74a0f7a910bd687992db24029287d43

  • SSDEEP

    12288:YkQkbnZ4SgtrPVbMncWwH3xXQ54BK8F64ix470Sm+X1eikHY9aCT5QW:Y47kRscWwxgMKg6PxJSmLLwai

Score
7/10

Malware Config

Targets

    • Target

      0c77fd059672554ccff0bc2a9cd1046a_JaffaCakes118

    • Size

      624KB

    • MD5

      0c77fd059672554ccff0bc2a9cd1046a

    • SHA1

      83708b04c63e07cd81c710ebd81e99146454742d

    • SHA256

      114f31f9c1317f121760fafcd257adb7ea48ce41e46a2f526c431b15f2380c54

    • SHA512

      1f6101448cae182e3898f91e977ca23aab67ad605f2fb368c67990f92046fc1b74b730d9f4f70aac48c95bf466921b92c74a0f7a910bd687992db24029287d43

    • SSDEEP

      12288:YkQkbnZ4SgtrPVbMncWwH3xXQ54BK8F64ix470Sm+X1eikHY9aCT5QW:Y47kRscWwxgMKg6PxJSmLLwai

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks