General

  • Target

    68fab1decc79eebb04d10e4721f02755_JaffaCakes118

  • Size

    679KB

  • Sample

    240522-3bdnbach55

  • MD5

    68fab1decc79eebb04d10e4721f02755

  • SHA1

    c369c272f33999e8377333421a2e6027906bd6b1

  • SHA256

    120a6a74e099acfcf3c1ebd9e366b63bc492c16576f5e785f723c832f374b2b3

  • SHA512

    a690f9796a0c4c9b4764f0cd6c341306e1c3f073a1824116593e06252054dff28455c9515247671b72ae5b32cfc8ce58e87ad75af4fec6442663e13958e61dfa

  • SSDEEP

    12288:SRO2Q8Iu71MZvr2ymO6l4S+obhFIVgFmO/oG3G+zQmS+Lrv7KXpQB9EzDk8BAZ0:Im88Kjh4SnbMKFmO/osPTS8v7KXpQBqb

Score
7/10

Malware Config

Targets

    • Target

      68fab1decc79eebb04d10e4721f02755_JaffaCakes118

    • Size

      679KB

    • MD5

      68fab1decc79eebb04d10e4721f02755

    • SHA1

      c369c272f33999e8377333421a2e6027906bd6b1

    • SHA256

      120a6a74e099acfcf3c1ebd9e366b63bc492c16576f5e785f723c832f374b2b3

    • SHA512

      a690f9796a0c4c9b4764f0cd6c341306e1c3f073a1824116593e06252054dff28455c9515247671b72ae5b32cfc8ce58e87ad75af4fec6442663e13958e61dfa

    • SSDEEP

      12288:SRO2Q8Iu71MZvr2ymO6l4S+obhFIVgFmO/oG3G+zQmS+Lrv7KXpQB9EzDk8BAZ0:Im88Kjh4SnbMKFmO/osPTS8v7KXpQBqb

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks