General

  • Target

    42e711a168300880731ba5200c2960cf_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240713-xfe42ssgln

  • MD5

    42e711a168300880731ba5200c2960cf

  • SHA1

    344e8fe7bddd1383f37c0fc2e4b5d1bf8fdb6c5f

  • SHA256

    333b6565cf566e10290ba78505a7c9fb0c5a993f766e6f4c54c084e2b49a0ccd

  • SHA512

    86ebcb2f5117380b7f352a143731b5a16c609d85f2c40fe98ab979d54f4dbbf4e336032c933fcd9c5d4ac662e1c927d6680f034b130860204387d95b5d229ee5

  • SSDEEP

    49152:F/gJxpx3pzay2mmDr0x8/2L3VJKzStFPmiujCsuLlZZ2C+UILw:F/8xD31aumHM8/s/uiKCBLYRUIE

Score
7/10

Malware Config

Targets

    • Target

      42e711a168300880731ba5200c2960cf_JaffaCakes118

    • Size

      2.2MB

    • MD5

      42e711a168300880731ba5200c2960cf

    • SHA1

      344e8fe7bddd1383f37c0fc2e4b5d1bf8fdb6c5f

    • SHA256

      333b6565cf566e10290ba78505a7c9fb0c5a993f766e6f4c54c084e2b49a0ccd

    • SHA512

      86ebcb2f5117380b7f352a143731b5a16c609d85f2c40fe98ab979d54f4dbbf4e336032c933fcd9c5d4ac662e1c927d6680f034b130860204387d95b5d229ee5

    • SSDEEP

      49152:F/gJxpx3pzay2mmDr0x8/2L3VJKzStFPmiujCsuLlZZ2C+UILw:F/8xD31aumHM8/s/uiKCBLYRUIE

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks