General

  • Target

    8d1ad465db214bed71321c6510627bae_JaffaCakes118

  • Size

    10KB

  • Sample

    240812-dvnvysxcla

  • MD5

    8d1ad465db214bed71321c6510627bae

  • SHA1

    833c9802b0bd8bdbd8ed6d38f0705bd500a787e9

  • SHA256

    09b029d24c0cd327bca48a0b01a92dd4e2a3c694485596fdf31adbf83259603f

  • SHA512

    2616dbe7a45da5200abdcc0c286bf83c0e1073bab0cb942d7ae8e19918b30f6a72384cf32ec167db5ac10a2c4803ab11359ef7ba04f17cf0121b82e3d82dd4fb

  • SSDEEP

    192:ONc3cE87dUfuBPOGQFaviRh+YfNYLZlTM7oguNjsw:ONo822t7QiA+YIyogw

Malware Config

Targets

    • Target

      8d1ad465db214bed71321c6510627bae_JaffaCakes118

    • Size

      10KB

    • MD5

      8d1ad465db214bed71321c6510627bae

    • SHA1

      833c9802b0bd8bdbd8ed6d38f0705bd500a787e9

    • SHA256

      09b029d24c0cd327bca48a0b01a92dd4e2a3c694485596fdf31adbf83259603f

    • SHA512

      2616dbe7a45da5200abdcc0c286bf83c0e1073bab0cb942d7ae8e19918b30f6a72384cf32ec167db5ac10a2c4803ab11359ef7ba04f17cf0121b82e3d82dd4fb

    • SSDEEP

      192:ONc3cE87dUfuBPOGQFaviRh+YfNYLZlTM7oguNjsw:ONo822t7QiA+YIyogw

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks