General

  • Target

    168aaf421ebb374aa75db9282e595266_JaffaCakes118

  • Size

    110KB

  • Sample

    240627-sz21psxgqd

  • MD5

    168aaf421ebb374aa75db9282e595266

  • SHA1

    e7801719f9b03062138996fe501e3ae2812774ce

  • SHA256

    9dc9db0883a316ca5efba4bd5727c682d96677522e724cb9fc0fb0ecdea3b47f

  • SHA512

    7edb2bb71a0243b2d80e427a5a640beb50fbafe13f266b5c0b9ab2c9b71e048414d1cbf4aa84be27a3755f37b9f76c8443f6af23885bfa1499054d1bc6c2727b

  • SSDEEP

    3072:lwqcIJw57695b0swLBqBee5/DyyFuwY08ZzoKJ:lwqc2hz2BqBDVlUU8dJJ

Malware Config

Targets

    • Target

      168aaf421ebb374aa75db9282e595266_JaffaCakes118

    • Size

      110KB

    • MD5

      168aaf421ebb374aa75db9282e595266

    • SHA1

      e7801719f9b03062138996fe501e3ae2812774ce

    • SHA256

      9dc9db0883a316ca5efba4bd5727c682d96677522e724cb9fc0fb0ecdea3b47f

    • SHA512

      7edb2bb71a0243b2d80e427a5a640beb50fbafe13f266b5c0b9ab2c9b71e048414d1cbf4aa84be27a3755f37b9f76c8443f6af23885bfa1499054d1bc6c2727b

    • SSDEEP

      3072:lwqcIJw57695b0swLBqBee5/DyyFuwY08ZzoKJ:lwqc2hz2BqBDVlUU8dJJ

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks