General

  • Target

    7b4bdc7dc207ef7574ce62e0df2bcc7e_JaffaCakes118

  • Size

    680KB

  • Sample

    240528-b9h7xaad7y

  • MD5

    7b4bdc7dc207ef7574ce62e0df2bcc7e

  • SHA1

    a3fdbb56e9ef8c28fac54482d5c01eb665db6e0f

  • SHA256

    05b4d9097025019b0832965ee5d2ddc8df2caee97cdf392d184a602ec7beb378

  • SHA512

    7d60ac6ad462c6689a090271cf88a2e57302e137d634195fef7d5d13b9a5d31ddb3be41936828b2a75ad52e058536586c29d134ed5f1604b9e467e5c3a93f73a

  • SSDEEP

    12288:cRO2Q8Iu71MZvr2ymO6l4S+obhFIVgFmO/oG3G+zQmS+Lrv7KXpQB9EzDk8BAZ0E:Wm88Kjh4SnbMKFmO/osPTS8v7KXpQBqc

Score
7/10

Malware Config

Targets

    • Target

      7b4bdc7dc207ef7574ce62e0df2bcc7e_JaffaCakes118

    • Size

      680KB

    • MD5

      7b4bdc7dc207ef7574ce62e0df2bcc7e

    • SHA1

      a3fdbb56e9ef8c28fac54482d5c01eb665db6e0f

    • SHA256

      05b4d9097025019b0832965ee5d2ddc8df2caee97cdf392d184a602ec7beb378

    • SHA512

      7d60ac6ad462c6689a090271cf88a2e57302e137d634195fef7d5d13b9a5d31ddb3be41936828b2a75ad52e058536586c29d134ed5f1604b9e467e5c3a93f73a

    • SSDEEP

      12288:cRO2Q8Iu71MZvr2ymO6l4S+obhFIVgFmO/oG3G+zQmS+Lrv7KXpQB9EzDk8BAZ0E:Wm88Kjh4SnbMKFmO/osPTS8v7KXpQBqc

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks