General

  • Target

    a9038c65b792fdf7d186c8037cf16773_JaffaCakes118

  • Size

    2.3MB

  • Sample

    240819-bqq4eawekc

  • MD5

    a9038c65b792fdf7d186c8037cf16773

  • SHA1

    e1a08884945a1c510fa01fdb641367edd7cb6ebc

  • SHA256

    6c6b9be81bd0134569bec6b5ab67f4dda2e9d501c85ba9a80ad3d59b5c2eb6d4

  • SHA512

    1bcbd5c8684f7467c35cc96dbd35d7d3fe7a1cd074104ff1e00e210375da943581ceddfdd0cf2ff457dda924d90db5adb90d084af81fa37ac8eea758d67478e0

  • SSDEEP

    49152:z1ZvlxgPTavOV1AQzbYpnkwB+xLVLMj4biV4hdvK/l/qEYH:zjvfQISBbklF4Rh9Kg

Score
7/10

Malware Config

Targets

    • Target

      a9038c65b792fdf7d186c8037cf16773_JaffaCakes118

    • Size

      2.3MB

    • MD5

      a9038c65b792fdf7d186c8037cf16773

    • SHA1

      e1a08884945a1c510fa01fdb641367edd7cb6ebc

    • SHA256

      6c6b9be81bd0134569bec6b5ab67f4dda2e9d501c85ba9a80ad3d59b5c2eb6d4

    • SHA512

      1bcbd5c8684f7467c35cc96dbd35d7d3fe7a1cd074104ff1e00e210375da943581ceddfdd0cf2ff457dda924d90db5adb90d084af81fa37ac8eea758d67478e0

    • SSDEEP

      49152:z1ZvlxgPTavOV1AQzbYpnkwB+xLVLMj4biV4hdvK/l/qEYH:zjvfQISBbklF4Rh9Kg

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks