General

  • Target

    1b887c356e741dcea8a859c4947f9f8b_JaffaCakes118

  • Size

    17KB

  • Sample

    240701-q3wa8aycnp

  • MD5

    1b887c356e741dcea8a859c4947f9f8b

  • SHA1

    ab301ffab01bff3e1642f61c9d07b19d4faba3f5

  • SHA256

    f1bc67313c41e98222bd33b4558f1f573743418de564a8219f57f65051248f53

  • SHA512

    1b449aff123154a72037ff3179894b1d1e0d1d8d7cc8d71e9575e3c71652247f27db28c4cbffc3731202aa7f9061c1b558d635814932745706b018ecfb0a87a3

  • SSDEEP

    384:tIDLteUBrwmkPPPbkaFpK4sSCQpRvozyLQuLUfJ7ctmPyC3M:tIDLEUBr9Cg2p3sSvphLBIfJ7cDp

Score
7/10

Malware Config

Targets

    • Target

      1b887c356e741dcea8a859c4947f9f8b_JaffaCakes118

    • Size

      17KB

    • MD5

      1b887c356e741dcea8a859c4947f9f8b

    • SHA1

      ab301ffab01bff3e1642f61c9d07b19d4faba3f5

    • SHA256

      f1bc67313c41e98222bd33b4558f1f573743418de564a8219f57f65051248f53

    • SHA512

      1b449aff123154a72037ff3179894b1d1e0d1d8d7cc8d71e9575e3c71652247f27db28c4cbffc3731202aa7f9061c1b558d635814932745706b018ecfb0a87a3

    • SSDEEP

      384:tIDLteUBrwmkPPPbkaFpK4sSCQpRvozyLQuLUfJ7ctmPyC3M:tIDLEUBr9Cg2p3sSvphLBIfJ7cDp

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks