General

  • Target

    b5499f608222505fbb59d09a32d48125_JaffaCakes118

  • Size

    250KB

  • Sample

    240821-2cj12sxflj

  • MD5

    b5499f608222505fbb59d09a32d48125

  • SHA1

    c15faaa02ccc9cc494c108106e36ff356f82411a

  • SHA256

    16401240e6bd9806889dea960dc98ac957ec1e76841766024d84f2f6f1fde8df

  • SHA512

    209f139d8927e10387ecd06a4dbf662719dae21f9fe8864e05c473b51a86dc6e8654f42ec940d5cc455d5f50b2628558f075d3181e706cdfed9b9d39791ce484

  • SSDEEP

    6144:0hieuJDr5T8b2ufqBLjSB/MS7irtIa6cwoD8ZroSfjGFA:VeKrJJuf86AYcwoaoSbr

Malware Config

Targets

    • Target

      b5499f608222505fbb59d09a32d48125_JaffaCakes118

    • Size

      250KB

    • MD5

      b5499f608222505fbb59d09a32d48125

    • SHA1

      c15faaa02ccc9cc494c108106e36ff356f82411a

    • SHA256

      16401240e6bd9806889dea960dc98ac957ec1e76841766024d84f2f6f1fde8df

    • SHA512

      209f139d8927e10387ecd06a4dbf662719dae21f9fe8864e05c473b51a86dc6e8654f42ec940d5cc455d5f50b2628558f075d3181e706cdfed9b9d39791ce484

    • SSDEEP

      6144:0hieuJDr5T8b2ufqBLjSB/MS7irtIa6cwoD8ZroSfjGFA:VeKrJJuf86AYcwoaoSbr

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks