General

  • Target

    1b9d7bba26841a2f126b9e9c0b9af3a7_JaffaCakes118

  • Size

    13KB

  • Sample

    240701-rl6laswdkh

  • MD5

    1b9d7bba26841a2f126b9e9c0b9af3a7

  • SHA1

    bab53f7d7e2b6db1b6d37f65997d5c3b46ff47e9

  • SHA256

    03a28f7e581fa910f45eb78f1c563d13d44d329e64889b94ffa46818b871cf5c

  • SHA512

    3b6e317f4ba7683d97f11b1be9676a7df4b770a80663398b2b1deac3d21e10a717a962b229986cd0a0a08d6d6c1aac5b7e9eb8c303078ad48d86ac2ad98983fd

  • SSDEEP

    384:NTz9CDsxpRrB7y1Xk65cntevN8yCAt2OefD0IvH+:NTcsxPUR5ctev6yCAt4Z

Malware Config

Targets

    • Target

      1b9d7bba26841a2f126b9e9c0b9af3a7_JaffaCakes118

    • Size

      13KB

    • MD5

      1b9d7bba26841a2f126b9e9c0b9af3a7

    • SHA1

      bab53f7d7e2b6db1b6d37f65997d5c3b46ff47e9

    • SHA256

      03a28f7e581fa910f45eb78f1c563d13d44d329e64889b94ffa46818b871cf5c

    • SHA512

      3b6e317f4ba7683d97f11b1be9676a7df4b770a80663398b2b1deac3d21e10a717a962b229986cd0a0a08d6d6c1aac5b7e9eb8c303078ad48d86ac2ad98983fd

    • SSDEEP

      384:NTz9CDsxpRrB7y1Xk65cntevN8yCAt2OefD0IvH+:NTcsxPUR5ctev6yCAt4Z

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks