General

  • Target

    1b8be036da2e7d9065da6dc0b71e0c45_JaffaCakes118

  • Size

    10KB

  • Sample

    240701-q6h53aydql

  • MD5

    1b8be036da2e7d9065da6dc0b71e0c45

  • SHA1

    d36890d0bb26f031ff1f50e062605d80e3e1bdd2

  • SHA256

    7d0bde5599d6b4cc266ef390085c0f5308099d284ecd31d674fc956feef2d8d2

  • SHA512

    4a4477754f40a19eeb69b8725a30d7c64cb685e98c78c8a75a576662185e890e8b0491956cff57c2de94f912616259199607db684ddfdc76665c03c6a89db803

  • SSDEEP

    192:ZxYI3Z07C9Y4Mgkd92/O7lXsZnH1KYzWTpfugWhlEkIpeMb+:ZxLJ07bHo/GknH1KYaAgglDW+

Malware Config

Targets

    • Target

      1b8be036da2e7d9065da6dc0b71e0c45_JaffaCakes118

    • Size

      10KB

    • MD5

      1b8be036da2e7d9065da6dc0b71e0c45

    • SHA1

      d36890d0bb26f031ff1f50e062605d80e3e1bdd2

    • SHA256

      7d0bde5599d6b4cc266ef390085c0f5308099d284ecd31d674fc956feef2d8d2

    • SHA512

      4a4477754f40a19eeb69b8725a30d7c64cb685e98c78c8a75a576662185e890e8b0491956cff57c2de94f912616259199607db684ddfdc76665c03c6a89db803

    • SSDEEP

      192:ZxYI3Z07C9Y4Mgkd92/O7lXsZnH1KYzWTpfugWhlEkIpeMb+:ZxLJ07bHo/GknH1KYaAgglDW+

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks