General

  • Target

    1b87042edee59291e0720480c979b5ce_JaffaCakes118

  • Size

    20KB

  • Sample

    240701-q2zbgsvdjf

  • MD5

    1b87042edee59291e0720480c979b5ce

  • SHA1

    44bf878fb610f2d972073662178cb617a92bbee3

  • SHA256

    38fa318058d9f22349806e58c99830f91933349c2322efe5205adf06d2ec29af

  • SHA512

    1188788f7bcac2150144a75f5fbadf2ee13feb9b56314671522f8aad9edcf9aad5391340f97731aab48e38b68f0d6ddd113a083e6eb67fa191181a4ae2b63449

  • SSDEEP

    384:UiWnkW7Ti4oOpdiXYrZOQn3OrjlOonRjDHwJgLaFVp2y1N2eaEZj4Kwr:05GnagY7n3ONfwKLpy/3ZNW

Score
8/10

Malware Config

Targets

    • Target

      1b87042edee59291e0720480c979b5ce_JaffaCakes118

    • Size

      20KB

    • MD5

      1b87042edee59291e0720480c979b5ce

    • SHA1

      44bf878fb610f2d972073662178cb617a92bbee3

    • SHA256

      38fa318058d9f22349806e58c99830f91933349c2322efe5205adf06d2ec29af

    • SHA512

      1188788f7bcac2150144a75f5fbadf2ee13feb9b56314671522f8aad9edcf9aad5391340f97731aab48e38b68f0d6ddd113a083e6eb67fa191181a4ae2b63449

    • SSDEEP

      384:UiWnkW7Ti4oOpdiXYrZOQn3OrjlOonRjDHwJgLaFVp2y1N2eaEZj4Kwr:05GnagY7n3ONfwKLpy/3ZNW

    Score
    8/10
    • Event Triggered Execution: Image File Execution Options Injection

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks