General

  • Target

    94839281334b534dd00681394fc59da7_JaffaCakes118

  • Size

    648KB

  • Sample

    240813-ym5tqatare

  • MD5

    94839281334b534dd00681394fc59da7

  • SHA1

    e02fe27efcce89fc512c6f7247c2fe1fe303dc00

  • SHA256

    22a029cedf587c1c8d7f9ec5b83fda86acfb4ea619829ac0db7f1bf2d7fcef2a

  • SHA512

    3a1b447c547a2df190957ee952870ed3b2054d66e0907067bd7cf257065a548be2bb45bebd08f2705c8db91a0697ff274fd743e5cf689974162e1eeaf254e664

  • SSDEEP

    12288:YvNveoGTcr98HwJb0jbELyXiCZzlnqB0307ZhnMB8bk7CmvppF5skhx:YlGpTcqH+iXiCZh/ElxM647Xp/sC

Malware Config

Targets

    • Target

      94839281334b534dd00681394fc59da7_JaffaCakes118

    • Size

      648KB

    • MD5

      94839281334b534dd00681394fc59da7

    • SHA1

      e02fe27efcce89fc512c6f7247c2fe1fe303dc00

    • SHA256

      22a029cedf587c1c8d7f9ec5b83fda86acfb4ea619829ac0db7f1bf2d7fcef2a

    • SHA512

      3a1b447c547a2df190957ee952870ed3b2054d66e0907067bd7cf257065a548be2bb45bebd08f2705c8db91a0697ff274fd743e5cf689974162e1eeaf254e664

    • SSDEEP

      12288:YvNveoGTcr98HwJb0jbELyXiCZzlnqB0307ZhnMB8bk7CmvppF5skhx:YlGpTcqH+iXiCZh/ElxM647Xp/sC

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks