General

  • Target

    17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118

  • Size

    73KB

  • Sample

    240627-2klvlsvgja

  • MD5

    17ca21ea226f7ad7b315ee607d4f9620

  • SHA1

    3323c02573143594587b1f3e853497642026b0ca

  • SHA256

    a857973a19d8d4c412ce59aade69bc40fe41dc6a4b07c9b5e8ae004c08ce7d22

  • SHA512

    82ff51106ff7589573a1840baf8465b8bd35e8119d736fc6939fb1941f03c9ed35895b4900901234938715c31dbb2accc29b6ca0f4c4e3efef7d0d79193f7835

  • SSDEEP

    1536:H/a7Z4sx7EwYbUXKAgnM6C/v/m52zv/PzTluvKDCCRO:fL2ESgnXXK/XluvKDCR

Malware Config

Targets

    • Target

      17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118

    • Size

      73KB

    • MD5

      17ca21ea226f7ad7b315ee607d4f9620

    • SHA1

      3323c02573143594587b1f3e853497642026b0ca

    • SHA256

      a857973a19d8d4c412ce59aade69bc40fe41dc6a4b07c9b5e8ae004c08ce7d22

    • SHA512

      82ff51106ff7589573a1840baf8465b8bd35e8119d736fc6939fb1941f03c9ed35895b4900901234938715c31dbb2accc29b6ca0f4c4e3efef7d0d79193f7835

    • SSDEEP

      1536:H/a7Z4sx7EwYbUXKAgnM6C/v/m52zv/PzTluvKDCCRO:fL2ESgnXXK/XluvKDCR

    • Disables service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks