General

  • Target

    4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118

  • Size

    250KB

  • Sample

    240715-1jzvea1anq

  • MD5

    4b8605483e64ded7c0439de8aa0bde7f

  • SHA1

    96d5ea931da582a10c3deae5ed09584041654e60

  • SHA256

    1d6e10130d7464ccb948cd5f63a088a9dfa62d368902b3da7a420228c7058bae

  • SHA512

    eccaf45da06377471877f6f33bc5f945aa381af170bb63c0442dd2c158eb011fd87c18ef6c175a9f8f94b5045e58f1248ab5016f329e8ca9f00050679ca9b1e0

  • SSDEEP

    6144:OhieuJDr5T8b2ufqBLjSB/MS7irtIa6cwoD8ZroSfjGFA:beKrJJuf86AYcwoaoSbr

Malware Config

Targets

    • Target

      4b8605483e64ded7c0439de8aa0bde7f_JaffaCakes118

    • Size

      250KB

    • MD5

      4b8605483e64ded7c0439de8aa0bde7f

    • SHA1

      96d5ea931da582a10c3deae5ed09584041654e60

    • SHA256

      1d6e10130d7464ccb948cd5f63a088a9dfa62d368902b3da7a420228c7058bae

    • SHA512

      eccaf45da06377471877f6f33bc5f945aa381af170bb63c0442dd2c158eb011fd87c18ef6c175a9f8f94b5045e58f1248ab5016f329e8ca9f00050679ca9b1e0

    • SSDEEP

      6144:OhieuJDr5T8b2ufqBLjSB/MS7irtIa6cwoD8ZroSfjGFA:beKrJJuf86AYcwoaoSbr

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks