General

  • Target

    8bc41aa2f906216d384ba8f8cf6553cb_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240811-yrl76szckb

  • MD5

    8bc41aa2f906216d384ba8f8cf6553cb

  • SHA1

    35068fbf8fb49b707d2c90ad2bb473cefbfacdfc

  • SHA256

    11804156a1ee88dea62ac84434c73b5693f867785802c9e906370548bd3814af

  • SHA512

    5b99d4b6569882a532f5f421a26628413510bc155557e8cfdea8984dc88c13056fec7946e7bbcc871602c055ba3be28a327b68add382ca5ab101c03c1f38f8e0

  • SSDEEP

    49152:t4wPO/wF1VSHOsj1BD3SYRGrQaieNBhwhd4:t4wPO/wgHpBZoEaiCBaha

Malware Config

Targets

    • Target

      8bc41aa2f906216d384ba8f8cf6553cb_JaffaCakes118

    • Size

      2.0MB

    • MD5

      8bc41aa2f906216d384ba8f8cf6553cb

    • SHA1

      35068fbf8fb49b707d2c90ad2bb473cefbfacdfc

    • SHA256

      11804156a1ee88dea62ac84434c73b5693f867785802c9e906370548bd3814af

    • SHA512

      5b99d4b6569882a532f5f421a26628413510bc155557e8cfdea8984dc88c13056fec7946e7bbcc871602c055ba3be28a327b68add382ca5ab101c03c1f38f8e0

    • SSDEEP

      49152:t4wPO/wF1VSHOsj1BD3SYRGrQaieNBhwhd4:t4wPO/wgHpBZoEaiCBaha

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Impair Defenses: Safe Mode Boot

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks