General

  • Target

    8c6c9263a2328234432b8215d761a4c9_JaffaCakes118

  • Size

    10KB

  • Sample

    240811-3jkrlayeqe

  • MD5

    8c6c9263a2328234432b8215d761a4c9

  • SHA1

    385e7ae4e8bca1ec0d170bc313ceed7f3b1d4c25

  • SHA256

    84a1ec3d4008b9d94550d17e3be6cb19509cb1c4029c52b9ffc4fecd1e63b461

  • SHA512

    668c896c82e3e4d20e78670c66620391bd6b3704d9ca64a5acb5fdbe13bd762d88bf6f1f24b8d860be774c78167222340fbdfb876240510bf3c67ae2290f4d06

  • SSDEEP

    192:K0GIW4/PPqxHggV+yTz+Y37HTo5WuQFT9wtSInI:K0GT4Xy1ggV+C+i7Hs5WuQFr4I

Malware Config

Targets

    • Target

      8c6c9263a2328234432b8215d761a4c9_JaffaCakes118

    • Size

      10KB

    • MD5

      8c6c9263a2328234432b8215d761a4c9

    • SHA1

      385e7ae4e8bca1ec0d170bc313ceed7f3b1d4c25

    • SHA256

      84a1ec3d4008b9d94550d17e3be6cb19509cb1c4029c52b9ffc4fecd1e63b461

    • SHA512

      668c896c82e3e4d20e78670c66620391bd6b3704d9ca64a5acb5fdbe13bd762d88bf6f1f24b8d860be774c78167222340fbdfb876240510bf3c67ae2290f4d06

    • SSDEEP

      192:K0GIW4/PPqxHggV+yTz+Y37HTo5WuQFT9wtSInI:K0GT4Xy1ggV+C+i7Hs5WuQFr4I

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks