General

  • Target

    aac8ddb79fc416f1b49860523b762a4e_JaffaCakes118

  • Size

    17KB

  • Sample

    240819-nbdkzs1bmh

  • MD5

    aac8ddb79fc416f1b49860523b762a4e

  • SHA1

    e7098461955d4bc811189f44bf88cfac78760ece

  • SHA256

    a93aebff869628f8c9cf8834c7db48296c48cfab0578624286608e2ff0b39578

  • SHA512

    cfadfc265f6a274a035a4752bf448a4c431a1bb92156aa37728d5fa1f840a1679965cc707aeece58b232a61d28565da4426717574e086c022e6cc73e28360f39

  • SSDEEP

    192:aH1/HOYYVJdbG4VvRK0KSFR56GzBLlhOANkxFaOus2TPTec8TDBzQliiAih1elpy:W/HOBVvK4D5XtBJhOjAlTP8Dd8iFRd2

Malware Config

Targets

    • Target

      aac8ddb79fc416f1b49860523b762a4e_JaffaCakes118

    • Size

      17KB

    • MD5

      aac8ddb79fc416f1b49860523b762a4e

    • SHA1

      e7098461955d4bc811189f44bf88cfac78760ece

    • SHA256

      a93aebff869628f8c9cf8834c7db48296c48cfab0578624286608e2ff0b39578

    • SHA512

      cfadfc265f6a274a035a4752bf448a4c431a1bb92156aa37728d5fa1f840a1679965cc707aeece58b232a61d28565da4426717574e086c022e6cc73e28360f39

    • SSDEEP

      192:aH1/HOYYVJdbG4VvRK0KSFR56GzBLlhOANkxFaOus2TPTec8TDBzQliiAih1elpy:W/HOBVvK4D5XtBJhOjAlTP8Dd8iFRd2

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks