General

  • Target

    5b0cbce55e2774adf8eef9d00ed6b902_JaffaCakes118

  • Size

    194KB

  • Sample

    240719-jp16zszdqp

  • MD5

    5b0cbce55e2774adf8eef9d00ed6b902

  • SHA1

    32c3f341d21dcb054f3b2804347481c52eec6437

  • SHA256

    bda8b07199ccb0aafc6797eaa9d7e7a63dd585f1733b3f6436101949cfbce839

  • SHA512

    307a65d54ab732c0290843d53438af6e5e594328792191071d3a0eb6906854462c5d8687b6644c713f1be734b2359101cd4c676dc5ae93619c61acb67e880a3d

  • SSDEEP

    6144:pmE1ZqjiDAHmTwsL2V6bbLiqmOqzz+oyM:w6Zqj2WsL2V83MbGoyM

Malware Config

Targets

    • Target

      5b0cbce55e2774adf8eef9d00ed6b902_JaffaCakes118

    • Size

      194KB

    • MD5

      5b0cbce55e2774adf8eef9d00ed6b902

    • SHA1

      32c3f341d21dcb054f3b2804347481c52eec6437

    • SHA256

      bda8b07199ccb0aafc6797eaa9d7e7a63dd585f1733b3f6436101949cfbce839

    • SHA512

      307a65d54ab732c0290843d53438af6e5e594328792191071d3a0eb6906854462c5d8687b6644c713f1be734b2359101cd4c676dc5ae93619c61acb67e880a3d

    • SSDEEP

      6144:pmE1ZqjiDAHmTwsL2V6bbLiqmOqzz+oyM:w6Zqj2WsL2V83MbGoyM

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.