General

  • Target

    59e580dee37ca860ed3f02b18af455a9_JaffaCakes118

  • Size

    20KB

  • Sample

    240719-bs2b6ayhmf

  • MD5

    59e580dee37ca860ed3f02b18af455a9

  • SHA1

    c8298a78fa34dde544d47119515f0ed7a1be9438

  • SHA256

    62f9ebe33c9b3a8aadefbfacd76e66138901f3c4918006240267222f06fc5b36

  • SHA512

    3970495a4b8d3af2c563d41d2183a7f41c831d0805a48dc495e53b785e6f72338b139190a45d57eea574770b46605a74f1fbc5370fde8242b9f0506301900bb1

  • SSDEEP

    384:4g8m7f2vD4ASphFpsqW3p9fhK1HU0FoUG8zyhYG4Mzgs6m1mML:4jm7f21UG3pK1L3G8+CG4Mzgk1mML

Score
8/10

Malware Config

Targets

    • Target

      59e580dee37ca860ed3f02b18af455a9_JaffaCakes118

    • Size

      20KB

    • MD5

      59e580dee37ca860ed3f02b18af455a9

    • SHA1

      c8298a78fa34dde544d47119515f0ed7a1be9438

    • SHA256

      62f9ebe33c9b3a8aadefbfacd76e66138901f3c4918006240267222f06fc5b36

    • SHA512

      3970495a4b8d3af2c563d41d2183a7f41c831d0805a48dc495e53b785e6f72338b139190a45d57eea574770b46605a74f1fbc5370fde8242b9f0506301900bb1

    • SSDEEP

      384:4g8m7f2vD4ASphFpsqW3p9fhK1HU0FoUG8zyhYG4Mzgs6m1mML:4jm7f21UG3pK1L3G8+CG4Mzgk1mML

    Score
    8/10
    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks