General

  • Target

    94a5ff705624aff62608105f77126b08_JaffaCakes118

  • Size

    123KB

  • Sample

    240813-zgcfnaverg

  • MD5

    94a5ff705624aff62608105f77126b08

  • SHA1

    5d35d8f7fbefa06b4d4cd3481389533c9fbed4bc

  • SHA256

    45b50ff43794a672a545244455d2d9af9edb1584b98e3545dd60a6273591eb0e

  • SHA512

    bdc3a80d87e8f57f903fc33948e402913bc2a72253a14bc2661622302882377e1f3533d34041cb706c0a579838584fe7c5e83a0bd92bdd15ae7ec5dce9d55a07

  • SSDEEP

    3072:ueSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLPUvFjGob:uVYrJrOSsRwcpRSjG2

Score
8/10

Malware Config

Targets

    • Target

      94a5ff705624aff62608105f77126b08_JaffaCakes118

    • Size

      123KB

    • MD5

      94a5ff705624aff62608105f77126b08

    • SHA1

      5d35d8f7fbefa06b4d4cd3481389533c9fbed4bc

    • SHA256

      45b50ff43794a672a545244455d2d9af9edb1584b98e3545dd60a6273591eb0e

    • SHA512

      bdc3a80d87e8f57f903fc33948e402913bc2a72253a14bc2661622302882377e1f3533d34041cb706c0a579838584fe7c5e83a0bd92bdd15ae7ec5dce9d55a07

    • SSDEEP

      3072:ueSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLPUvFjGob:uVYrJrOSsRwcpRSjG2

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks