General

  • Target

    3ec6a3c55a341dcf25bc9aa07f3fcd57_JaffaCakes118

  • Size

    11KB

  • Sample

    240712-zabwjs1era

  • MD5

    3ec6a3c55a341dcf25bc9aa07f3fcd57

  • SHA1

    c3b7d1be29ee73cae0a4584bfe0e68531098843d

  • SHA256

    b58c26c7f5482f21f13999e6682b94af2bf852327bf98a81067bfccdf175ea49

  • SHA512

    244c79560b7ae46a7f595f53751b9db6d7b608d32025797a14d40914b9949849165d6783aa295b94204052195c08b30201f6c32842ecd0ee60c5a19043b7ab82

  • SSDEEP

    192:OL5E2xt0GE2K/51kWCqkGm1EeI5pebW3gVmx1ZRqHE2XdfBAMsykeSJbb5:O9LEFCpGm13I5pSVINqHEEfSM9Uh

Malware Config

Targets

    • Target

      3ec6a3c55a341dcf25bc9aa07f3fcd57_JaffaCakes118

    • Size

      11KB

    • MD5

      3ec6a3c55a341dcf25bc9aa07f3fcd57

    • SHA1

      c3b7d1be29ee73cae0a4584bfe0e68531098843d

    • SHA256

      b58c26c7f5482f21f13999e6682b94af2bf852327bf98a81067bfccdf175ea49

    • SHA512

      244c79560b7ae46a7f595f53751b9db6d7b608d32025797a14d40914b9949849165d6783aa295b94204052195c08b30201f6c32842ecd0ee60c5a19043b7ab82

    • SSDEEP

      192:OL5E2xt0GE2K/51kWCqkGm1EeI5pebW3gVmx1ZRqHE2XdfBAMsykeSJbb5:O9LEFCpGm13I5pSVINqHEEfSM9Uh

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks