General

  • Target

    408c3ae24b347e40add556484754bd84_JaffaCakes118

  • Size

    10KB

  • Sample

    240713-g841wa1hrg

  • MD5

    408c3ae24b347e40add556484754bd84

  • SHA1

    a20004b7c8943d43cbbd1d92c34b4aa2b29b0d04

  • SHA256

    a30d67634eb30eb3fa3d738a8492314c2c8b64e139130a75c7294765a96486ee

  • SHA512

    ae245f3c60d22cfb7fb5eaf0b51c262d11b0fdb950af4083461ca02963b744d041192a11f426242d40a96072dc574b9cfb49d9886556e639ebd80fe2a07603d6

  • SSDEEP

    192:AgzxM9W2r3Fbu3AGBMWW9K+xpGGy/n6k7AUtzHcBg:Bz61bu3BMWW9K+hkPIg

Malware Config

Targets

    • Target

      408c3ae24b347e40add556484754bd84_JaffaCakes118

    • Size

      10KB

    • MD5

      408c3ae24b347e40add556484754bd84

    • SHA1

      a20004b7c8943d43cbbd1d92c34b4aa2b29b0d04

    • SHA256

      a30d67634eb30eb3fa3d738a8492314c2c8b64e139130a75c7294765a96486ee

    • SHA512

      ae245f3c60d22cfb7fb5eaf0b51c262d11b0fdb950af4083461ca02963b744d041192a11f426242d40a96072dc574b9cfb49d9886556e639ebd80fe2a07603d6

    • SSDEEP

      192:AgzxM9W2r3Fbu3AGBMWW9K+xpGGy/n6k7AUtzHcBg:Bz61bu3BMWW9K+hkPIg

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks