General

  • Target

    96cd692247e9c7cf628a03e011cfd924_JaffaCakes118

  • Size

    2.8MB

  • Sample

    240605-a54glshh24

  • MD5

    96cd692247e9c7cf628a03e011cfd924

  • SHA1

    ec9b3d5dc31b1b36a6bef6c944ce03e9fdb9d5b1

  • SHA256

    127220a2ee65316bbfcaa97f6c3ad11dbe6e7dc8b74ef4d2257cede8c17dbba4

  • SHA512

    b2679c2f21f6a02de5b4634592d930cd0a28742ebd8cad820b6099ca70d5dbddcca73e5684abc0e5532d5e96037b543efd959423d424d04ae9a776d3c0feca3c

  • SSDEEP

    49152:p9Or9f0aaFEgbHF7u8gvlN51KVE0n+LurW6AdCPTule5xJOGpfj:3baaFEcF7u8gvlRm+WW6ADe5XVj

Malware Config

Targets

    • Target

      96cd692247e9c7cf628a03e011cfd924_JaffaCakes118

    • Size

      2.8MB

    • MD5

      96cd692247e9c7cf628a03e011cfd924

    • SHA1

      ec9b3d5dc31b1b36a6bef6c944ce03e9fdb9d5b1

    • SHA256

      127220a2ee65316bbfcaa97f6c3ad11dbe6e7dc8b74ef4d2257cede8c17dbba4

    • SHA512

      b2679c2f21f6a02de5b4634592d930cd0a28742ebd8cad820b6099ca70d5dbddcca73e5684abc0e5532d5e96037b543efd959423d424d04ae9a776d3c0feca3c

    • SSDEEP

      49152:p9Or9f0aaFEgbHF7u8gvlN51KVE0n+LurW6AdCPTule5xJOGpfj:3baaFEcF7u8gvlRm+WW6ADe5XVj

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks