General

  • Target

    8a06db50663a68de466c92406f59e093_JaffaCakes118

  • Size

    14KB

  • Sample

    240811-mkp5pszdqh

  • MD5

    8a06db50663a68de466c92406f59e093

  • SHA1

    10da13f19ff050a08a64f5a68165eec98f2b0d69

  • SHA256

    4152077af40d5821c137bc44893767dc83617ed5c60b9861bbf1500d1fb2d555

  • SHA512

    cc47102964a4d4f6efd4b062828f4469bcab66883d92cf72f4f09bbe7ea8752433171b8dad629acd062305b5f17d487bda819d4f7e15f81a90b87e3d99eee620

  • SSDEEP

    384:2vI2g4LSz8mtS9ooqPmOpDa3qcEbIfKPHaiO+TNlB2:2vI2s4KS6oqPnpDa3iAKzO+T7B

Malware Config

Targets

    • Target

      8a06db50663a68de466c92406f59e093_JaffaCakes118

    • Size

      14KB

    • MD5

      8a06db50663a68de466c92406f59e093

    • SHA1

      10da13f19ff050a08a64f5a68165eec98f2b0d69

    • SHA256

      4152077af40d5821c137bc44893767dc83617ed5c60b9861bbf1500d1fb2d555

    • SHA512

      cc47102964a4d4f6efd4b062828f4469bcab66883d92cf72f4f09bbe7ea8752433171b8dad629acd062305b5f17d487bda819d4f7e15f81a90b87e3d99eee620

    • SSDEEP

      384:2vI2g4LSz8mtS9ooqPmOpDa3qcEbIfKPHaiO+TNlB2:2vI2s4KS6oqPnpDa3iAKzO+T7B

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks