General

  • Target

    39f78ce528f26213188b390c4ff7d544_JaffaCakes118

  • Size

    11KB

  • Sample

    240711-vcq12axhkf

  • MD5

    39f78ce528f26213188b390c4ff7d544

  • SHA1

    37aa344bb3bfc1e618f738117ff85589a67a428b

  • SHA256

    644e042a2bee81a9fbdae095ce69472a0da37a13f9e33dd9873fe1c72444b564

  • SHA512

    e182c98df466ed27cdf2f7122b42f9da98ad5f054b65be550f5e003a260457bc7624bfe611fc8c9f12f8597a4ccd3f00f6886c15ec5d4bfbb6922ecd5081b83f

  • SSDEEP

    192:YfmSO1JM6+wWtIlJHyFh7L+S2dlJx9CiL99P/lj1sFlDdCNcVg:omSO1JM6+wWyjS37CxFHC699BcdCSg

Malware Config

Targets

    • Target

      39f78ce528f26213188b390c4ff7d544_JaffaCakes118

    • Size

      11KB

    • MD5

      39f78ce528f26213188b390c4ff7d544

    • SHA1

      37aa344bb3bfc1e618f738117ff85589a67a428b

    • SHA256

      644e042a2bee81a9fbdae095ce69472a0da37a13f9e33dd9873fe1c72444b564

    • SHA512

      e182c98df466ed27cdf2f7122b42f9da98ad5f054b65be550f5e003a260457bc7624bfe611fc8c9f12f8597a4ccd3f00f6886c15ec5d4bfbb6922ecd5081b83f

    • SSDEEP

      192:YfmSO1JM6+wWtIlJHyFh7L+S2dlJx9CiL99P/lj1sFlDdCNcVg:omSO1JM6+wWyjS37CxFHC699BcdCSg

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks