General

  • Target

    86c4c35439fd5cfe3aff15e8765e2050_JaffaCakes118

  • Size

    345KB

  • Sample

    240810-tree4s1elg

  • MD5

    86c4c35439fd5cfe3aff15e8765e2050

  • SHA1

    e12e37c922d5b97c055f5d82f1a6fa7db9ad3e66

  • SHA256

    0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1

  • SHA512

    7858a9577ac4ce24d974914a2b25a7c2920c137bcc3dd2af91846bf618c85c6cff57d84a8e26a2840e48b23412ad5c41482a133c22d1958f7ccd674eadd5bd84

  • SSDEEP

    6144:CO+v5qbv5qPyMmQpPmzs0dsa+Ql4oe4351qaey0YICpmpod:EqdqPRHPmzs0ebFi35befepmpI

Malware Config

Targets

    • Target

      86c4c35439fd5cfe3aff15e8765e2050_JaffaCakes118

    • Size

      345KB

    • MD5

      86c4c35439fd5cfe3aff15e8765e2050

    • SHA1

      e12e37c922d5b97c055f5d82f1a6fa7db9ad3e66

    • SHA256

      0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1

    • SHA512

      7858a9577ac4ce24d974914a2b25a7c2920c137bcc3dd2af91846bf618c85c6cff57d84a8e26a2840e48b23412ad5c41482a133c22d1958f7ccd674eadd5bd84

    • SSDEEP

      6144:CO+v5qbv5qPyMmQpPmzs0dsa+Ql4oe4351qaey0YICpmpod:EqdqPRHPmzs0ebFi35befepmpI

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks