General

  • Target

    774012924375d40a160dc2650e0dc63f_JaffaCakes118

  • Size

    924KB

  • Sample

    240727-hjn4ssvglg

  • MD5

    774012924375d40a160dc2650e0dc63f

  • SHA1

    b1190439de6ed8c5352f76b802ff781a5f5339b1

  • SHA256

    e6c4d7fe4e57cdb91fa1ad64eb1bef94e2a59715f3bcbee89be251cb1a3d1d02

  • SHA512

    761ad16d63ca0a28e97c7e13dec71d00a094104d5d42a219d310eaec978bc432f2690f8e4e94cd1fada823dc8121e289f4016888323815bb3f69bce2d3da91f4

  • SSDEEP

    12288:6aWzgMg7v3qnCiMErQohh0F4CCJ8lny/QLx73uEPQFOT6h1n9SOq8fL8gBA:1aHMv6Corjqny/QLsE8IYVwn8fXBA

Malware Config

Targets

    • Target

      774012924375d40a160dc2650e0dc63f_JaffaCakes118

    • Size

      924KB

    • MD5

      774012924375d40a160dc2650e0dc63f

    • SHA1

      b1190439de6ed8c5352f76b802ff781a5f5339b1

    • SHA256

      e6c4d7fe4e57cdb91fa1ad64eb1bef94e2a59715f3bcbee89be251cb1a3d1d02

    • SHA512

      761ad16d63ca0a28e97c7e13dec71d00a094104d5d42a219d310eaec978bc432f2690f8e4e94cd1fada823dc8121e289f4016888323815bb3f69bce2d3da91f4

    • SSDEEP

      12288:6aWzgMg7v3qnCiMErQohh0F4CCJ8lny/QLx73uEPQFOT6h1n9SOq8fL8gBA:1aHMv6Corjqny/QLsE8IYVwn8fXBA

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks