General

  • Target

    100a21ab5bb488a9126c1b582b7962d0_JaffaCakes118

  • Size

    11KB

  • Sample

    240626-af2aysscma

  • MD5

    100a21ab5bb488a9126c1b582b7962d0

  • SHA1

    6d81dfb46864109e0d9f1867900151cd8bd393d7

  • SHA256

    5ecb5502a4ab98421441372264d7581c9f9bf1462f5308a30c151ae392192275

  • SHA512

    b11cd46e7dbf54a45e7630243e2ee627a349c8e8b0bd799cef6c7896caa19d50ddad976f3ca08dd7460f1d3613426bdade36b8abd23ca42e0354bf75b791a11b

  • SSDEEP

    192:TfwwELhAiY2N5xwqr7bdWZ/0Y1IUZn5tw1kClIKkAmQi9r3MeVMAOfomq2xeQg:rwwExL5xwqRCMo5tTQ/nggdL5g

Malware Config

Targets

    • Target

      100a21ab5bb488a9126c1b582b7962d0_JaffaCakes118

    • Size

      11KB

    • MD5

      100a21ab5bb488a9126c1b582b7962d0

    • SHA1

      6d81dfb46864109e0d9f1867900151cd8bd393d7

    • SHA256

      5ecb5502a4ab98421441372264d7581c9f9bf1462f5308a30c151ae392192275

    • SHA512

      b11cd46e7dbf54a45e7630243e2ee627a349c8e8b0bd799cef6c7896caa19d50ddad976f3ca08dd7460f1d3613426bdade36b8abd23ca42e0354bf75b791a11b

    • SSDEEP

      192:TfwwELhAiY2N5xwqr7bdWZ/0Y1IUZn5tw1kClIKkAmQi9r3MeVMAOfomq2xeQg:rwwExL5xwqRCMo5tTQ/nggdL5g

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks