General

  • Target

    8549c7a67140992ad29caeca6a7b078e_JaffaCakes118

  • Size

    217KB

  • Sample

    240810-je5resvfna

  • MD5

    8549c7a67140992ad29caeca6a7b078e

  • SHA1

    64dbec45b5c0bfaae98120907b76b477ef2ef241

  • SHA256

    f8542567145e4c94af7605c3d761b115c97df5fa449eaa75eee568d5fba54b20

  • SHA512

    35f332801cf47562c200f3e99e6054234af48a6f8919a5d8a0a096c5131d0a849e68538127a73b921b00f14188a7f5835061fc3b063c0d9090626a55d917838d

  • SSDEEP

    6144:IGDtFu0Xw+DZs1THlTSZ9iwdyj+1KmWiGroS3M:nIzTHlOZndV0zroS3M

Malware Config

Targets

    • Target

      8549c7a67140992ad29caeca6a7b078e_JaffaCakes118

    • Size

      217KB

    • MD5

      8549c7a67140992ad29caeca6a7b078e

    • SHA1

      64dbec45b5c0bfaae98120907b76b477ef2ef241

    • SHA256

      f8542567145e4c94af7605c3d761b115c97df5fa449eaa75eee568d5fba54b20

    • SHA512

      35f332801cf47562c200f3e99e6054234af48a6f8919a5d8a0a096c5131d0a849e68538127a73b921b00f14188a7f5835061fc3b063c0d9090626a55d917838d

    • SSDEEP

      6144:IGDtFu0Xw+DZs1THlTSZ9iwdyj+1KmWiGroS3M:nIzTHlOZndV0zroS3M

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks