General

  • Target

    b2b51877931cbe02d93fd84c36d01ed1_JaffaCakes118

  • Size

    162KB

  • Sample

    240821-jzv3qa1hmj

  • MD5

    b2b51877931cbe02d93fd84c36d01ed1

  • SHA1

    dff851f226f7264e843720e6ad155aa4af4f4590

  • SHA256

    73bbf6055c3128960195e01f4b37a044a0e0324b80251dd0a4540144f391c055

  • SHA512

    a28bb23baa6443878e80de3bf67b9cd16e985299ca12255d2fd2d10095c085229884b2683c2460f52ad11b180614e37fe225285075d8b09fe44af4d1f724100c

  • SSDEEP

    3072:CGC4mTElLZ9Ig4T2E52U6OyMNPQTHgnW6A4SlU5Mkm/7p9rzk3qq3TNj:CWmIlLZOg4B52UNpPtnW5HzjkawTV

Malware Config

Targets

    • Target

      b2b51877931cbe02d93fd84c36d01ed1_JaffaCakes118

    • Size

      162KB

    • MD5

      b2b51877931cbe02d93fd84c36d01ed1

    • SHA1

      dff851f226f7264e843720e6ad155aa4af4f4590

    • SHA256

      73bbf6055c3128960195e01f4b37a044a0e0324b80251dd0a4540144f391c055

    • SHA512

      a28bb23baa6443878e80de3bf67b9cd16e985299ca12255d2fd2d10095c085229884b2683c2460f52ad11b180614e37fe225285075d8b09fe44af4d1f724100c

    • SSDEEP

      3072:CGC4mTElLZ9Ig4T2E52U6OyMNPQTHgnW6A4SlU5Mkm/7p9rzk3qq3TNj:CWmIlLZOg4B52UNpPtnW5HzjkawTV

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks