General

  • Target

    0dcd8699800d2f535b95b8aac917560f_JaffaCakes118

  • Size

    20KB

  • Sample

    240625-m1jmvsvhjh

  • MD5

    0dcd8699800d2f535b95b8aac917560f

  • SHA1

    3a002286a1a57cdbe957603fc869a2ad07f8bc32

  • SHA256

    b78729019cddbce7d7eb8b2eca5e8e5c947bfc44a300305364731b3bec899cad

  • SHA512

    9e5f034c7997a68832e7975f513a192091765c56f2def85edf1a052849cee2ae5acbf8be0815fb31ef3f7db495f64f81ff913ff75853fb86015aa82006c0b818

  • SSDEEP

    384:qsr45SniZU+XEXAB4sFMsMTJJhBFfCQPaFAFZSetpvJeKJRsu61LU:qE4nZUeKsMsWqQyFgZj/JqBU

Malware Config

Targets

    • Target

      0dcd8699800d2f535b95b8aac917560f_JaffaCakes118

    • Size

      20KB

    • MD5

      0dcd8699800d2f535b95b8aac917560f

    • SHA1

      3a002286a1a57cdbe957603fc869a2ad07f8bc32

    • SHA256

      b78729019cddbce7d7eb8b2eca5e8e5c947bfc44a300305364731b3bec899cad

    • SHA512

      9e5f034c7997a68832e7975f513a192091765c56f2def85edf1a052849cee2ae5acbf8be0815fb31ef3f7db495f64f81ff913ff75853fb86015aa82006c0b818

    • SSDEEP

      384:qsr45SniZU+XEXAB4sFMsMTJJhBFfCQPaFAFZSetpvJeKJRsu61LU:qE4nZUeKsMsWqQyFgZj/JqBU

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks