General

  • Target

    18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118

  • Size

    10KB

  • Sample

    240628-fpzflsvfpn

  • MD5

    18dfd74e6c9654a81c3696fc6560a48d

  • SHA1

    4c95fe3474091c3a4d922d46a9cd660a70a8cc93

  • SHA256

    570143ac72441e79ad044425cfca48159cac808db621378341cf4026813618a4

  • SHA512

    36573fe09fe9808e9a0c2cc9ecbc334ebf701efce6e5c42396a087046fcc1b65bcd99fba6460500be23ff3b7b738ba32e62735b7353436649a2c60f31f7d3875

  • SSDEEP

    192:MgzxM9W2r3Fbu3AGBMWW9K+xpGGy/n6kDUtzHcBg:dz61bu3BMWW9K+hkiIg

Malware Config

Targets

    • Target

      18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118

    • Size

      10KB

    • MD5

      18dfd74e6c9654a81c3696fc6560a48d

    • SHA1

      4c95fe3474091c3a4d922d46a9cd660a70a8cc93

    • SHA256

      570143ac72441e79ad044425cfca48159cac808db621378341cf4026813618a4

    • SHA512

      36573fe09fe9808e9a0c2cc9ecbc334ebf701efce6e5c42396a087046fcc1b65bcd99fba6460500be23ff3b7b738ba32e62735b7353436649a2c60f31f7d3875

    • SSDEEP

      192:MgzxM9W2r3Fbu3AGBMWW9K+xpGGy/n6kDUtzHcBg:dz61bu3BMWW9K+hkiIg

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks