General

  • Target

    88b1700bd9edbf4df6d3fff3fef2bd12_JaffaCakes118

  • Size

    305KB

  • Sample

    240811-dad51s1gkl

  • MD5

    88b1700bd9edbf4df6d3fff3fef2bd12

  • SHA1

    d97b0d32961f48a4133de50c1acbd077cccf9c85

  • SHA256

    c25dc1586fc6ae9774989749710b719c5b5ba739941b3b2844f77e0894684db3

  • SHA512

    dc2bc81bd006dcf866413e4dae272206df24f22255a49bec0be7dd46b22b52edc00bc9fbaf6762a828cf1792a88b3f5af283dc547a23544f4a3d500583c85683

  • SSDEEP

    6144:uzS7AIau4U4v4f4fuUE9HepXpxpQpLlM0C:sIau4U4v4f46HfO0C

Score
7/10

Malware Config

Targets

    • Target

      88b1700bd9edbf4df6d3fff3fef2bd12_JaffaCakes118

    • Size

      305KB

    • MD5

      88b1700bd9edbf4df6d3fff3fef2bd12

    • SHA1

      d97b0d32961f48a4133de50c1acbd077cccf9c85

    • SHA256

      c25dc1586fc6ae9774989749710b719c5b5ba739941b3b2844f77e0894684db3

    • SHA512

      dc2bc81bd006dcf866413e4dae272206df24f22255a49bec0be7dd46b22b52edc00bc9fbaf6762a828cf1792a88b3f5af283dc547a23544f4a3d500583c85683

    • SSDEEP

      6144:uzS7AIau4U4v4f4fuUE9HepXpxpQpLlM0C:sIau4U4v4f46HfO0C

    Score
    7/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks