General

  • Target

    81f65d2b179a0811f3d70f91323e8d33_JaffaCakes118

  • Size

    933KB

  • Sample

    240801-2aznqayhnq

  • MD5

    81f65d2b179a0811f3d70f91323e8d33

  • SHA1

    452c58efa74f02a48fa933b742e2a6b5518d099c

  • SHA256

    d13d73e111ab838dd2ff845c8ee19467baeab19c0eed98c418ede729be1385bb

  • SHA512

    8b86cfb7e86c6f33e6fe8c5ce644349b8e9cfc6aa97dba12eb0d468eb057861987dfd8ed39a2199c03dd152db926a5a91299facdf836ce349e104a8ada86c6c0

  • SSDEEP

    24576:yc7i4YmiuQr6JZbt/VesAUDWIsE0ONr9kSBhEwbjkvkj:ycW4YmiP61NeC6IsEbkSBhEwEs

Malware Config

Targets

    • Target

      81f65d2b179a0811f3d70f91323e8d33_JaffaCakes118

    • Size

      933KB

    • MD5

      81f65d2b179a0811f3d70f91323e8d33

    • SHA1

      452c58efa74f02a48fa933b742e2a6b5518d099c

    • SHA256

      d13d73e111ab838dd2ff845c8ee19467baeab19c0eed98c418ede729be1385bb

    • SHA512

      8b86cfb7e86c6f33e6fe8c5ce644349b8e9cfc6aa97dba12eb0d468eb057861987dfd8ed39a2199c03dd152db926a5a91299facdf836ce349e104a8ada86c6c0

    • SSDEEP

      24576:yc7i4YmiuQr6JZbt/VesAUDWIsE0ONr9kSBhEwbjkvkj:ycW4YmiP61NeC6IsEbkSBhEwEs

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks