General

  • Target

    839d3531a1b09c2b7b9e03210c6c5846_JaffaCakes118

  • Size

    19KB

  • Sample

    240809-1cgp9atflh

  • MD5

    839d3531a1b09c2b7b9e03210c6c5846

  • SHA1

    3c89a90e24e816f76e404e337d879b34ee2ec8fc

  • SHA256

    bfc0152f79d8753e13bf19379f9d09a0b57fc51c65988d64b9983eebfd58bced

  • SHA512

    fce0ab5b626d9d82fc28fd57325c0d22505727142e9fe43b8b0b9c6e8d9a08f0a92c3c0141f0147872ccf14ab9dbb2ffaf4df899e6761255d9841c501129f106

  • SSDEEP

    384:o29/CZ5Hh2hCegri4D9IvQnBRJrcyoTVmYYqhZ7:ozth2oeiAvUrK5Yq7

Malware Config

Targets

    • Target

      839d3531a1b09c2b7b9e03210c6c5846_JaffaCakes118

    • Size

      19KB

    • MD5

      839d3531a1b09c2b7b9e03210c6c5846

    • SHA1

      3c89a90e24e816f76e404e337d879b34ee2ec8fc

    • SHA256

      bfc0152f79d8753e13bf19379f9d09a0b57fc51c65988d64b9983eebfd58bced

    • SHA512

      fce0ab5b626d9d82fc28fd57325c0d22505727142e9fe43b8b0b9c6e8d9a08f0a92c3c0141f0147872ccf14ab9dbb2ffaf4df899e6761255d9841c501129f106

    • SSDEEP

      384:o29/CZ5Hh2hCegri4D9IvQnBRJrcyoTVmYYqhZ7:ozth2oeiAvUrK5Yq7

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks