General

  • Target

    182aa3600b2e2a2582cbdff590cc0efe_JaffaCakes118

  • Size

    18KB

  • Sample

    240628-a4msgatgql

  • MD5

    182aa3600b2e2a2582cbdff590cc0efe

  • SHA1

    e9c4faee3e83b3c565d302f0ac9984dbda7d0584

  • SHA256

    4246ae0769abaf929a01026643ba1a9c3c8b7ce040f20e06e4c2490ae96d09cc

  • SHA512

    7586764daf90a77e9a9832d5a202c65b3f52bd92d6924ec6a2061825b48929212a977a5723958edd66dcb4e015ee273a0a1847c6c87a5e673879e2faf1e0fe39

  • SSDEEP

    384:wZEAjClLuN1Vng8SlPH21IxwmySHLd9c1/4Q:wyQClCLtkJHFxwm5AA

Malware Config

Targets

    • Target

      182aa3600b2e2a2582cbdff590cc0efe_JaffaCakes118

    • Size

      18KB

    • MD5

      182aa3600b2e2a2582cbdff590cc0efe

    • SHA1

      e9c4faee3e83b3c565d302f0ac9984dbda7d0584

    • SHA256

      4246ae0769abaf929a01026643ba1a9c3c8b7ce040f20e06e4c2490ae96d09cc

    • SHA512

      7586764daf90a77e9a9832d5a202c65b3f52bd92d6924ec6a2061825b48929212a977a5723958edd66dcb4e015ee273a0a1847c6c87a5e673879e2faf1e0fe39

    • SSDEEP

      384:wZEAjClLuN1Vng8SlPH21IxwmySHLd9c1/4Q:wyQClCLtkJHFxwm5AA

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks