General

  • Target

    a591c11ef21ca4c977b571567d58e49d_JaffaCakes118

  • Size

    14KB

  • Sample

    240818-f75qca1ckn

  • MD5

    a591c11ef21ca4c977b571567d58e49d

  • SHA1

    d499ee4947a5583601fc32d6a3fc2837601e20db

  • SHA256

    633a768b9ce3d915489e6c7262e131723d80a026b438f031958f15f5246dcb53

  • SHA512

    efe0dcbb305358d36e1be14475eeb61b9d362e317bc3e527c163614a39098ceb9e361ae7c9369db1421476d991561d30f9f8e341ffccd02d07548ad0fb7bf1c9

  • SSDEEP

    384:fFM+isiu+vxAxr3wUwZwew2AuOEqyGKOrz:d1+g3cKuVq1Dr

Malware Config

Targets

    • Target

      a591c11ef21ca4c977b571567d58e49d_JaffaCakes118

    • Size

      14KB

    • MD5

      a591c11ef21ca4c977b571567d58e49d

    • SHA1

      d499ee4947a5583601fc32d6a3fc2837601e20db

    • SHA256

      633a768b9ce3d915489e6c7262e131723d80a026b438f031958f15f5246dcb53

    • SHA512

      efe0dcbb305358d36e1be14475eeb61b9d362e317bc3e527c163614a39098ceb9e361ae7c9369db1421476d991561d30f9f8e341ffccd02d07548ad0fb7bf1c9

    • SSDEEP

      384:fFM+isiu+vxAxr3wUwZwew2AuOEqyGKOrz:d1+g3cKuVq1Dr

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks