General

  • Target

    1353f5939b2dad54f0afeb0d991f7317_JaffaCakes118

  • Size

    9KB

  • Sample

    240504-svlsxscf96

  • MD5

    1353f5939b2dad54f0afeb0d991f7317

  • SHA1

    6ce6ab90c0b8729a363aa3ecc9364e754daee318

  • SHA256

    2f17b813d124eade65bd841b4a29a451ac938fbdcffe249a5742b3bf4225a437

  • SHA512

    bae4bdf4e619b919c70a1e9ce3c4e1fd2df04607c224edb40af1b65c6f71b1d19175c9d3b6bd9c08b8ef9fcb7f8473b3c250270f3656904109d0a006d037a868

  • SSDEEP

    192:eFPNoFe4/fYVZOR4eOYQAl7clUbT1lOCqT7aH0peTL8TBIhPq:KtGf7R4dtA5ceb23l82ug

Score
6/10

Malware Config

Targets

    • Target

      1353f5939b2dad54f0afeb0d991f7317_JaffaCakes118

    • Size

      9KB

    • MD5

      1353f5939b2dad54f0afeb0d991f7317

    • SHA1

      6ce6ab90c0b8729a363aa3ecc9364e754daee318

    • SHA256

      2f17b813d124eade65bd841b4a29a451ac938fbdcffe249a5742b3bf4225a437

    • SHA512

      bae4bdf4e619b919c70a1e9ce3c4e1fd2df04607c224edb40af1b65c6f71b1d19175c9d3b6bd9c08b8ef9fcb7f8473b3c250270f3656904109d0a006d037a868

    • SSDEEP

      192:eFPNoFe4/fYVZOR4eOYQAl7clUbT1lOCqT7aH0peTL8TBIhPq:KtGf7R4dtA5ceb23l82ug

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand paypal.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks