General

  • Target

    0703d5b8e6b75e144b15489af2308783_JaffaCakes118

  • Size

    579KB

  • Sample

    240624-ccad6sxgpl

  • MD5

    0703d5b8e6b75e144b15489af2308783

  • SHA1

    4aaa0bdb6670ec31a44c5bcce6be632c217fbda4

  • SHA256

    370ee1c2bcb7f0b6af3a486a826a8637a65f0ebc31897e46fa88cc05122b4df2

  • SHA512

    9436b10f7caa4f00387407a479d26710d85d0cd2381b2ef356b7bbaccdfcfbd752c6a0ce5ad079cf2ff1de69d26fc1848324d5d9db23ca733a886b6aa2e5c5f8

  • SSDEEP

    12288:YOb3lmhLR6QXTFTwWHy0o4M85C8vFFpTiDxRUl39dt2+:YIk7qWX9F0DQl39rx

Score
7/10

Malware Config

Targets

    • Target

      0703d5b8e6b75e144b15489af2308783_JaffaCakes118

    • Size

      579KB

    • MD5

      0703d5b8e6b75e144b15489af2308783

    • SHA1

      4aaa0bdb6670ec31a44c5bcce6be632c217fbda4

    • SHA256

      370ee1c2bcb7f0b6af3a486a826a8637a65f0ebc31897e46fa88cc05122b4df2

    • SHA512

      9436b10f7caa4f00387407a479d26710d85d0cd2381b2ef356b7bbaccdfcfbd752c6a0ce5ad079cf2ff1de69d26fc1848324d5d9db23ca733a886b6aa2e5c5f8

    • SSDEEP

      12288:YOb3lmhLR6QXTFTwWHy0o4M85C8vFFpTiDxRUl39dt2+:YIk7qWX9F0DQl39rx

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks