General

  • Target

    6f582a3dd15df3765cdaf970ed6bbc4e_JaffaCakes118

  • Size

    12KB

  • Sample

    240725-ndwvcawalj

  • MD5

    6f582a3dd15df3765cdaf970ed6bbc4e

  • SHA1

    3298577055112c64e5917a7aebc847b8f5f54beb

  • SHA256

    7431fa54a46c4efe93746c0bcc1fab3f131edd1ce1d8b4b5e7234667c0c13718

  • SHA512

    93915aee9fd7dba379f03a63ebfa53e2b31ff40ed55233911965f74906523da06ca6c5ab550078280d4641bebfe91ef4a4dd0529cd72beee01a58da4f1506281

  • SSDEEP

    192:oaRYtgiw2tEhkIqiDH0UsoVMBZ6tiKNHQ9dX/TeL8MTnRS8AObUwE:oaROgiftEhkHhoeBI5NHQr/6wM7Kj

Malware Config

Targets

    • Target

      6f582a3dd15df3765cdaf970ed6bbc4e_JaffaCakes118

    • Size

      12KB

    • MD5

      6f582a3dd15df3765cdaf970ed6bbc4e

    • SHA1

      3298577055112c64e5917a7aebc847b8f5f54beb

    • SHA256

      7431fa54a46c4efe93746c0bcc1fab3f131edd1ce1d8b4b5e7234667c0c13718

    • SHA512

      93915aee9fd7dba379f03a63ebfa53e2b31ff40ed55233911965f74906523da06ca6c5ab550078280d4641bebfe91ef4a4dd0529cd72beee01a58da4f1506281

    • SSDEEP

      192:oaRYtgiw2tEhkIqiDH0UsoVMBZ6tiKNHQ9dX/TeL8MTnRS8AObUwE:oaROgiftEhkHhoeBI5NHQr/6wM7Kj

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks