General

  • Target

    0ca4044e94b8487e7feb4fe8039c2f26_JaffaCakes118

  • Size

    123KB

  • Sample

    240625-fjm6dsvdkn

  • MD5

    0ca4044e94b8487e7feb4fe8039c2f26

  • SHA1

    a00b6d3c4660d2b3c97e7f7bb8b50f23272e10ec

  • SHA256

    bddd5e0f69e0207c7a9deb750ab0c1097e61f4da4beed1aa569156c7bd021ad7

  • SHA512

    8fd6a037746a7f355589f6d9cabffa7cd9e19da0978901bee3c954e85eae65cf7e75562eed3511dc66ddd39c2c611ac813f0227877e54c2ae1e01cc8d472f70e

  • SSDEEP

    3072:NeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLseHGxOdfkA:NVYrJrOSsRwcptHGusA

Score
8/10
upx

Malware Config

Targets

    • Target

      0ca4044e94b8487e7feb4fe8039c2f26_JaffaCakes118

    • Size

      123KB

    • MD5

      0ca4044e94b8487e7feb4fe8039c2f26

    • SHA1

      a00b6d3c4660d2b3c97e7f7bb8b50f23272e10ec

    • SHA256

      bddd5e0f69e0207c7a9deb750ab0c1097e61f4da4beed1aa569156c7bd021ad7

    • SHA512

      8fd6a037746a7f355589f6d9cabffa7cd9e19da0978901bee3c954e85eae65cf7e75562eed3511dc66ddd39c2c611ac813f0227877e54c2ae1e01cc8d472f70e

    • SSDEEP

      3072:NeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLseHGxOdfkA:NVYrJrOSsRwcptHGusA

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks