General

  • Target

    a4f545cdc6b1fba5b13228e8f4a1d16a_JaffaCakes118

  • Size

    121KB

  • Sample

    240818-cgbg2azaqh

  • MD5

    a4f545cdc6b1fba5b13228e8f4a1d16a

  • SHA1

    98bd53d98a8a6c3eb3ad94607c1eb86253a1d956

  • SHA256

    e1de5357fed4f2616c8777a3e3dceeab4b593cdc33997da220b1cbcfd25e90de

  • SHA512

    773c964ce7c2a3acbeee437c7fb99a04bcf4a477d74782b2a88fab6c2ff0fe144ae70618cf4646c2f35ec9b9caf2a1b56a4661d70a1c98a981303da64e26b490

  • SSDEEP

    3072:ueSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLeViA:uVYrJrOSsRwcpjA

Score
8/10

Malware Config

Targets

    • Target

      a4f545cdc6b1fba5b13228e8f4a1d16a_JaffaCakes118

    • Size

      121KB

    • MD5

      a4f545cdc6b1fba5b13228e8f4a1d16a

    • SHA1

      98bd53d98a8a6c3eb3ad94607c1eb86253a1d956

    • SHA256

      e1de5357fed4f2616c8777a3e3dceeab4b593cdc33997da220b1cbcfd25e90de

    • SHA512

      773c964ce7c2a3acbeee437c7fb99a04bcf4a477d74782b2a88fab6c2ff0fe144ae70618cf4646c2f35ec9b9caf2a1b56a4661d70a1c98a981303da64e26b490

    • SSDEEP

      3072:ueSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLeViA:uVYrJrOSsRwcpjA

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks