General

  • Target

    68650affbc791a395e043fa9400e7535_JaffaCakes118

  • Size

    563KB

  • Sample

    240723-va4t4ssemg

  • MD5

    68650affbc791a395e043fa9400e7535

  • SHA1

    ab1c55866cb01fe247970683668c0d481f95cf67

  • SHA256

    5ee68bdc413d83640c34f871b9669bcb4c0215181c33af05b450c414578879b7

  • SHA512

    2dff4bca1a10dbd3f5a2ba5302f002bee8c180c57cad2b8a77c10a748abee059f5331b3b85c71236188ae05136901dbd86b86a7b133e548fe582747947764051

  • SSDEEP

    6144:U67eQ7DeQokHT+v3DgmDTX9abtXZsK0TUG8Tj3r0mm:UYPyv3fhSN6EGw

Malware Config

Targets

    • Target

      68650affbc791a395e043fa9400e7535_JaffaCakes118

    • Size

      563KB

    • MD5

      68650affbc791a395e043fa9400e7535

    • SHA1

      ab1c55866cb01fe247970683668c0d481f95cf67

    • SHA256

      5ee68bdc413d83640c34f871b9669bcb4c0215181c33af05b450c414578879b7

    • SHA512

      2dff4bca1a10dbd3f5a2ba5302f002bee8c180c57cad2b8a77c10a748abee059f5331b3b85c71236188ae05136901dbd86b86a7b133e548fe582747947764051

    • SSDEEP

      6144:U67eQ7DeQokHT+v3DgmDTX9abtXZsK0TUG8Tj3r0mm:UYPyv3fhSN6EGw

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks