General

  • Target

    036b8f2bfec57c3e78d77c37d856e4dc_JaffaCakes118

  • Size

    12KB

  • Sample

    240620-gnlc2axbmm

  • MD5

    036b8f2bfec57c3e78d77c37d856e4dc

  • SHA1

    5b6cbd6d4f0606b27bac8f3a7b763377b676ee10

  • SHA256

    165db1d11a6a7145384a6468ff182c5922b68c2f69d019aa0e3fbfe0f8a6fc48

  • SHA512

    7b979f55361510451345387a4da2996b733441e4758902e2f20b5c98892988f8057a1e36cf3ff1159cf0355750f3738b5ebc36fd5a47d4efd5452e3c30565e00

  • SSDEEP

    192:+SxBb2PoBJRB0z1Nkpy8tWtS6Cg+S4k76cQAcK:+SxYPoBJy1NuWtB4y6Pu

Malware Config

Targets

    • Target

      036b8f2bfec57c3e78d77c37d856e4dc_JaffaCakes118

    • Size

      12KB

    • MD5

      036b8f2bfec57c3e78d77c37d856e4dc

    • SHA1

      5b6cbd6d4f0606b27bac8f3a7b763377b676ee10

    • SHA256

      165db1d11a6a7145384a6468ff182c5922b68c2f69d019aa0e3fbfe0f8a6fc48

    • SHA512

      7b979f55361510451345387a4da2996b733441e4758902e2f20b5c98892988f8057a1e36cf3ff1159cf0355750f3738b5ebc36fd5a47d4efd5452e3c30565e00

    • SSDEEP

      192:+SxBb2PoBJRB0z1Nkpy8tWtS6Cg+S4k76cQAcK:+SxYPoBJy1NuWtB4y6Pu

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks