General

  • Target

    96f85065c8597c980435489ac58e6c70_JaffaCakes118

  • Size

    123KB

  • Sample

    240814-vxr4tsyfll

  • MD5

    96f85065c8597c980435489ac58e6c70

  • SHA1

    4d3152980000813a674c5ba1c9e1890cf41bc019

  • SHA256

    c5bdc3169396cce8d92456f4b667528511fecdd7947362d4dd3acdf425521ae7

  • SHA512

    869938d2a76cc52f93b44a718cb3eab0a68a2bba85d54f84e2082e50e13aa7e669425a18802b08b81056b783b6d0aeb3fc963c57f7e07750e59df12a7dbc3001

  • SSDEEP

    3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLDX:OVYrJrOSsRwcpF

Score
8/10

Malware Config

Targets

    • Target

      96f85065c8597c980435489ac58e6c70_JaffaCakes118

    • Size

      123KB

    • MD5

      96f85065c8597c980435489ac58e6c70

    • SHA1

      4d3152980000813a674c5ba1c9e1890cf41bc019

    • SHA256

      c5bdc3169396cce8d92456f4b667528511fecdd7947362d4dd3acdf425521ae7

    • SHA512

      869938d2a76cc52f93b44a718cb3eab0a68a2bba85d54f84e2082e50e13aa7e669425a18802b08b81056b783b6d0aeb3fc963c57f7e07750e59df12a7dbc3001

    • SSDEEP

      3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLDX:OVYrJrOSsRwcpF

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks