General

  • Target

    15602f37e66ff1962c9be62c83e0347b_JaffaCakes118

  • Size

    9KB

  • Sample

    240505-bwtfqaad3x

  • MD5

    15602f37e66ff1962c9be62c83e0347b

  • SHA1

    b495284a25adbb9a1244e5fdc2a6b1660f31d1a4

  • SHA256

    ca00be555fe81427316374ebd9c4010b4dbb0bfd2b64e7fbc0dcc2149f61d97b

  • SHA512

    de80a6da6f14b099de6c26bc8c683f3a67b89cd1dbc8d423221ad951ea99bad0f92067ed9854fcc865e69f2ca723134d7d5089965cf24b97765b28f950a6137e

  • SSDEEP

    192:eFPNoFe4/fYVZOR4euYQAl7clUbT1lOCPT7aH0peTL8TBIhPq:KtGf7R4BtA5ceb2Ol82ug

Score
6/10

Malware Config

Targets

    • Target

      15602f37e66ff1962c9be62c83e0347b_JaffaCakes118

    • Size

      9KB

    • MD5

      15602f37e66ff1962c9be62c83e0347b

    • SHA1

      b495284a25adbb9a1244e5fdc2a6b1660f31d1a4

    • SHA256

      ca00be555fe81427316374ebd9c4010b4dbb0bfd2b64e7fbc0dcc2149f61d97b

    • SHA512

      de80a6da6f14b099de6c26bc8c683f3a67b89cd1dbc8d423221ad951ea99bad0f92067ed9854fcc865e69f2ca723134d7d5089965cf24b97765b28f950a6137e

    • SSDEEP

      192:eFPNoFe4/fYVZOR4euYQAl7clUbT1lOCPT7aH0peTL8TBIhPq:KtGf7R4BtA5ceb2Ol82ug

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand paypal.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks