General

  • Target

    a7db85b87d77ef7b8a08d1498cc0184e_JaffaCakes118

  • Size

    184KB

  • Sample

    240818-xsghmssepk

  • MD5

    a7db85b87d77ef7b8a08d1498cc0184e

  • SHA1

    c8890496a6506dd1aa9d80e1f01a2526707bcb4d

  • SHA256

    efde3e426cab9404af4c3856040c33596ceb47a8a91cabc52f4c8fa3571b839c

  • SHA512

    923863a2886441c2aa2dda0726fe63b3dc81c0dde775057e30f47ad0fed795a7f55f3629e689e519ff5d54646fade4d48ca624d78dadf48c67bc3e45221cfd33

  • SSDEEP

    3072:NXCkF+Zp9uDlt6fchd16dD8PCZZ72kikVxPaIFd:hSWIn7VxPaI

Malware Config

Targets

    • Target

      a7db85b87d77ef7b8a08d1498cc0184e_JaffaCakes118

    • Size

      184KB

    • MD5

      a7db85b87d77ef7b8a08d1498cc0184e

    • SHA1

      c8890496a6506dd1aa9d80e1f01a2526707bcb4d

    • SHA256

      efde3e426cab9404af4c3856040c33596ceb47a8a91cabc52f4c8fa3571b839c

    • SHA512

      923863a2886441c2aa2dda0726fe63b3dc81c0dde775057e30f47ad0fed795a7f55f3629e689e519ff5d54646fade4d48ca624d78dadf48c67bc3e45221cfd33

    • SSDEEP

      3072:NXCkF+Zp9uDlt6fchd16dD8PCZZ72kikVxPaIFd:hSWIn7VxPaI

    • Vobfus

      A widespread worm which spreads via network drives and removable media.

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks