General

  • Target

    a0eae46f3ceabc047ec519f9651482c6_JaffaCakes118

  • Size

    10KB

  • Sample

    240817-c83qlashnb

  • MD5

    a0eae46f3ceabc047ec519f9651482c6

  • SHA1

    c8eb8537797a31c2c0c57b7836bf54a1a8c8c4b5

  • SHA256

    2a0b0cf8b8827eceb9fe030354f8ab79828db3d0b04dbbdc4054b40bed59dd2d

  • SHA512

    84f54ac2442ff531a659140d931e4b8e5dbb154b534691e98f8dfcbad2b819246a1d578663e0c9319b65c1467aaa3b93934d07f0f5d030c5392dc18d8567136c

  • SSDEEP

    192:zgzxM9W2r3Fbu3AGBMWW9K+xpGGy/n6kJaFjQpcBg:Mz61bu3BMWW9K+hkJYQqg

Malware Config

Targets

    • Target

      a0eae46f3ceabc047ec519f9651482c6_JaffaCakes118

    • Size

      10KB

    • MD5

      a0eae46f3ceabc047ec519f9651482c6

    • SHA1

      c8eb8537797a31c2c0c57b7836bf54a1a8c8c4b5

    • SHA256

      2a0b0cf8b8827eceb9fe030354f8ab79828db3d0b04dbbdc4054b40bed59dd2d

    • SHA512

      84f54ac2442ff531a659140d931e4b8e5dbb154b534691e98f8dfcbad2b819246a1d578663e0c9319b65c1467aaa3b93934d07f0f5d030c5392dc18d8567136c

    • SSDEEP

      192:zgzxM9W2r3Fbu3AGBMWW9K+xpGGy/n6kJaFjQpcBg:Mz61bu3BMWW9K+hkJYQqg

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks