General

  • Target

    5f9a69a3e21098fadf0b10b586e0eeb8_JaffaCakes118

  • Size

    40KB

  • Sample

    240520-ryphjseg5v

  • MD5

    5f9a69a3e21098fadf0b10b586e0eeb8

  • SHA1

    f7d307bcd1249a5dbc7c1ab15eb4677c382e1f73

  • SHA256

    9c57041d9a925797683d3dd0fecca6e6ed30a271b3863029e7fa429c8e819237

  • SHA512

    a36e5fc7a60b678f38c46d28b23401c44696c29c9d577d2ceed2271cfb58f3146770bf8b19903fc16953e419220f29abe9c65153ad8d7f697002f242a50be621

  • SSDEEP

    768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHd:aqk/Zdic/qjh8w19JDHd

Malware Config

Targets

    • Target

      5f9a69a3e21098fadf0b10b586e0eeb8_JaffaCakes118

    • Size

      40KB

    • MD5

      5f9a69a3e21098fadf0b10b586e0eeb8

    • SHA1

      f7d307bcd1249a5dbc7c1ab15eb4677c382e1f73

    • SHA256

      9c57041d9a925797683d3dd0fecca6e6ed30a271b3863029e7fa429c8e819237

    • SHA512

      a36e5fc7a60b678f38c46d28b23401c44696c29c9d577d2ceed2271cfb58f3146770bf8b19903fc16953e419220f29abe9c65153ad8d7f697002f242a50be621

    • SSDEEP

      768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHd:aqk/Zdic/qjh8w19JDHd

    • Detected google phishing page

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks