General

  • Target

    3c060be2182e244fa690d18080ae1c8b_JaffaCakes118

  • Size

    421KB

  • Sample

    240712-fdj7jsyfpr

  • MD5

    3c060be2182e244fa690d18080ae1c8b

  • SHA1

    aaf45417fa96b1ef2f886989fe83210246deae94

  • SHA256

    8297a374333810406c9d2f305d47ca85a95cd781edd3f1bb7b7ccf13d4d87dfb

  • SHA512

    a89243a38d353c0ca2c19f1219adb3c5d785d2153c1ea45041e64a9dc595ecb73f67c220a7a260f1ab88ea2abec44230edd660b4e72c36fdfb658ef344ba8720

  • SSDEEP

    12288:MprPXjdJQK+KKTf7z05RjvpvmVxS2d3Av4:MprhljvpOVxS9

Score
8/10

Malware Config

Targets

    • Target

      3c060be2182e244fa690d18080ae1c8b_JaffaCakes118

    • Size

      421KB

    • MD5

      3c060be2182e244fa690d18080ae1c8b

    • SHA1

      aaf45417fa96b1ef2f886989fe83210246deae94

    • SHA256

      8297a374333810406c9d2f305d47ca85a95cd781edd3f1bb7b7ccf13d4d87dfb

    • SHA512

      a89243a38d353c0ca2c19f1219adb3c5d785d2153c1ea45041e64a9dc595ecb73f67c220a7a260f1ab88ea2abec44230edd660b4e72c36fdfb658ef344ba8720

    • SSDEEP

      12288:MprPXjdJQK+KKTf7z05RjvpvmVxS2d3Av4:MprhljvpOVxS9

    Score
    8/10
    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks