General

  • Target

    7847248792fb84e999bdda3ffb753c54_JaffaCakes118

  • Size

    94KB

  • Sample

    240727-p98z8a1akk

  • MD5

    7847248792fb84e999bdda3ffb753c54

  • SHA1

    81cc52bbf2232a25a93a0d0796d803537f9b01de

  • SHA256

    8c53c637ddb5466656e8fee98db33af4164710525d54c8e5c1c0a601944d6b46

  • SHA512

    a684c9b2f194d79daf643787beb596968239a09a604fde80554212f68f7738f521037b0d01c72f1184975800272f6da1021c1cc998e8e5a77fcbe4963bd22cf4

  • SSDEEP

    768:uW68HH9u80pxQKc0R7iONSlgV+f1ad7hrB7WYJ8Fjh7hQzTGfL7YmcZn5mmZn:uWFHH9u8kx9cClSl4w1q9rB2zQkOv

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    myofficelog
  • Password:
    741852

Targets

    • Target

      7847248792fb84e999bdda3ffb753c54_JaffaCakes118

    • Size

      94KB

    • MD5

      7847248792fb84e999bdda3ffb753c54

    • SHA1

      81cc52bbf2232a25a93a0d0796d803537f9b01de

    • SHA256

      8c53c637ddb5466656e8fee98db33af4164710525d54c8e5c1c0a601944d6b46

    • SHA512

      a684c9b2f194d79daf643787beb596968239a09a604fde80554212f68f7738f521037b0d01c72f1184975800272f6da1021c1cc998e8e5a77fcbe4963bd22cf4

    • SSDEEP

      768:uW68HH9u80pxQKc0R7iONSlgV+f1ad7hrB7WYJ8Fjh7hQzTGfL7YmcZn5mmZn:uWFHH9u8kx9cClSl4w1q9rB2zQkOv

    Score
    10/10
    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks