General

  • Target

    05a3629056bfba2f16a62abb6642a6f6_JaffaCakes118

  • Size

    15KB

  • Sample

    240620-nrlxasvgmb

  • MD5

    05a3629056bfba2f16a62abb6642a6f6

  • SHA1

    1100ce7c40db62f51ebacf9a32fb5ec38fa9eb85

  • SHA256

    b35707fb11796752b39c8ebcd7ecde9ce2b326f79381c0409a76a53013a2d61d

  • SHA512

    5a89bddbd4f80b85b6f885928fd099c9b00105dde5ae00644f12da1eb1ed3706a609b9ef13b134659100ac652ae14927829d1f5ed188c0509845b8a26cfc7481

  • SSDEEP

    384:nWICPj4MCyspApIZecVtpOL2kPW0JKCb9GEqOd:nx04MDLpSC2e9RJGET

Malware Config

Targets

    • Target

      05a3629056bfba2f16a62abb6642a6f6_JaffaCakes118

    • Size

      15KB

    • MD5

      05a3629056bfba2f16a62abb6642a6f6

    • SHA1

      1100ce7c40db62f51ebacf9a32fb5ec38fa9eb85

    • SHA256

      b35707fb11796752b39c8ebcd7ecde9ce2b326f79381c0409a76a53013a2d61d

    • SHA512

      5a89bddbd4f80b85b6f885928fd099c9b00105dde5ae00644f12da1eb1ed3706a609b9ef13b134659100ac652ae14927829d1f5ed188c0509845b8a26cfc7481

    • SSDEEP

      384:nWICPj4MCyspApIZecVtpOL2kPW0JKCb9GEqOd:nx04MDLpSC2e9RJGET

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks