General

  • Target

    94e25c096c1c21cf10a1628a1756e685_JaffaCakes118

  • Size

    1.5MB

  • MD5

    94e25c096c1c21cf10a1628a1756e685

  • SHA1

    2f948e9a231bdc11beea763429acf509ef957c31

  • SHA256

    3b1277e7d4caf012d387f42267cca0cd5af4b8ff0ac42682b366f419765994b1

  • SHA512

    51da45f918631249183bf809aa8b900c03dae6a21e78a87e25be68d57693a9a26f34843778191dd9cc0095e84a117a07c57230922715b5abe3a84bcf655a6211

  • SSDEEP

    24576:tR0K0/g/No94eeQTYkvd2h77/QfrwpGgh/l1VObZtLeQTYkvd2h77/QffI:tRv1OlTHskspJ/lS7THskg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Unsigned PE 6 IoCs

    Checks for missing Authenticode signature.

Files

  • 94e25c096c1c21cf10a1628a1756e685_JaffaCakes118
    .zip
  • ProcessCritical/BSOD.au3
    .ps1
  • ProcessCritical/BSOD.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • ProcessCritical/BSOD64.exe
    .exe windows:5 windows x64 arch:x64

    1eb9071ddd5c2fb5179069f43f4aed99


    Headers

    Imports

    Sections

  • ProcessCritical/ProcessCritical.au3
    .ps1
  • ProcessCritical/ProcessCritical.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • ProcessCritical/ProcessCritical64.exe
    .exe windows:5 windows x64 arch:x64

    1eb9071ddd5c2fb5179069f43f4aed99


    Headers

    Imports

    Sections

  • ProcessCritical/readme.txt