General

  • Target

    966df379e65737b5bda6fc736c20f556_JaffaCakes118

  • Size

    14KB

  • Sample

    240814-rk2wqa1fnj

  • MD5

    966df379e65737b5bda6fc736c20f556

  • SHA1

    b7d9ca93076d8ebedcf5692e56165a83545c58be

  • SHA256

    a795703f957c5c917d574a8771438268f3b8f971717cd347a8aa89f8c64acf3e

  • SHA512

    7673cab4256ef753004965a3f5eed1261082ff6c5f4543dffd6ab4dc9d13a087f32682d258874b46aed61f841a34c9e297feb59dcc8af86f424506550e1c81e4

  • SSDEEP

    384:ZaSIXbJ94a3bgIjqyOpzVElcjX6ufqcSC0atxo:ZaSIrJ+T63OpzVpr70atx

Malware Config

Targets

    • Target

      966df379e65737b5bda6fc736c20f556_JaffaCakes118

    • Size

      14KB

    • MD5

      966df379e65737b5bda6fc736c20f556

    • SHA1

      b7d9ca93076d8ebedcf5692e56165a83545c58be

    • SHA256

      a795703f957c5c917d574a8771438268f3b8f971717cd347a8aa89f8c64acf3e

    • SHA512

      7673cab4256ef753004965a3f5eed1261082ff6c5f4543dffd6ab4dc9d13a087f32682d258874b46aed61f841a34c9e297feb59dcc8af86f424506550e1c81e4

    • SSDEEP

      384:ZaSIXbJ94a3bgIjqyOpzVElcjX6ufqcSC0atxo:ZaSIrJ+T63OpzVpr70atx

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks