General

  • Target

    617f7ec967d079af13431e0ed8b662b0_JaffaCakes118

  • Size

    8KB

  • Sample

    240721-1hd7bawcjg

  • MD5

    617f7ec967d079af13431e0ed8b662b0

  • SHA1

    66a21d003e087daf31522a6ff9d382e3d6022ff6

  • SHA256

    970e4303850665f329b8c513a022c89ff6f6031ef516d7c9b979d3bdef4aa54e

  • SHA512

    0874a159b41ca3b2c647a3b0a9ad31ce227f4761d64ff3db47ea3f2625d0a84c30fe8822023f827e6cd26a024207b74b836a69d5a1f9bb95b2d008ce66b26df7

  • SSDEEP

    192:RNd5VUOzlc3uF/EQxVWMfaAMyHkiwbSH6aR:nPdlAQxVFfa1CnwbQ6aR

Score
8/10

Malware Config

Targets

    • Target

      617f7ec967d079af13431e0ed8b662b0_JaffaCakes118

    • Size

      8KB

    • MD5

      617f7ec967d079af13431e0ed8b662b0

    • SHA1

      66a21d003e087daf31522a6ff9d382e3d6022ff6

    • SHA256

      970e4303850665f329b8c513a022c89ff6f6031ef516d7c9b979d3bdef4aa54e

    • SHA512

      0874a159b41ca3b2c647a3b0a9ad31ce227f4761d64ff3db47ea3f2625d0a84c30fe8822023f827e6cd26a024207b74b836a69d5a1f9bb95b2d008ce66b26df7

    • SSDEEP

      192:RNd5VUOzlc3uF/EQxVWMfaAMyHkiwbSH6aR:nPdlAQxVFfa1CnwbQ6aR

    Score
    8/10
    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks