General

  • Target

    633610e0015c2c6b6431092a670c171c_JaffaCakes118

  • Size

    183KB

  • Sample

    240722-ph4lesxbnd

  • MD5

    633610e0015c2c6b6431092a670c171c

  • SHA1

    dd59224add23f28d4ef8fe5d51635a91217c769f

  • SHA256

    88ee5c3f7b20dbf878cec805b1b2039b2348c084025863f50bed36501cdff3fb

  • SHA512

    8d5ba6f022b44599e3fc22018d5bce0bb9729624ee977ca64212d7de52e28fc7905a54aca18020b5762bd8dd9c744b0dcbf89f556d9d68dd64bd6772082189b3

  • SSDEEP

    3072:EamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqVu:Eazq3aipalYuhoao5sQkzi

Score
8/10
upx

Malware Config

Targets

    • Target

      633610e0015c2c6b6431092a670c171c_JaffaCakes118

    • Size

      183KB

    • MD5

      633610e0015c2c6b6431092a670c171c

    • SHA1

      dd59224add23f28d4ef8fe5d51635a91217c769f

    • SHA256

      88ee5c3f7b20dbf878cec805b1b2039b2348c084025863f50bed36501cdff3fb

    • SHA512

      8d5ba6f022b44599e3fc22018d5bce0bb9729624ee977ca64212d7de52e28fc7905a54aca18020b5762bd8dd9c744b0dcbf89f556d9d68dd64bd6772082189b3

    • SSDEEP

      3072:EamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqVu:Eazq3aipalYuhoao5sQkzi

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks