General

  • Target

    61f528e1813298cc63d9461623fe3c78_JaffaCakes118

  • Size

    11KB

  • Sample

    240721-3z21tatepm

  • MD5

    61f528e1813298cc63d9461623fe3c78

  • SHA1

    49740ebab6c3c39191daa5ebf2b2231ff4e0c625

  • SHA256

    6ef29fb875f6def97af4f58a5568bb5646d4d4cbf96062ff6171889b1b93b36a

  • SHA512

    a68e9cc4a9b9ee01226719dd69b08986b7b07f3105f4704e13aff7f77fcc5a0dbb181335eb17a24cdf53a6f74a451379f6d6c03b1a724033821ea6ffdc3b7d9e

  • SSDEEP

    192:RYR+wsLmf9VfgnkYWCoIne80kotFfBnVPJ0YtjbBUdb1e65:e6irfgkYfX0t93B1tjbBUdbb

Malware Config

Targets

    • Target

      61f528e1813298cc63d9461623fe3c78_JaffaCakes118

    • Size

      11KB

    • MD5

      61f528e1813298cc63d9461623fe3c78

    • SHA1

      49740ebab6c3c39191daa5ebf2b2231ff4e0c625

    • SHA256

      6ef29fb875f6def97af4f58a5568bb5646d4d4cbf96062ff6171889b1b93b36a

    • SHA512

      a68e9cc4a9b9ee01226719dd69b08986b7b07f3105f4704e13aff7f77fcc5a0dbb181335eb17a24cdf53a6f74a451379f6d6c03b1a724033821ea6ffdc3b7d9e

    • SSDEEP

      192:RYR+wsLmf9VfgnkYWCoIne80kotFfBnVPJ0YtjbBUdb1e65:e6irfgkYfX0t93B1tjbBUdbb

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks