General

  • Target

    b2f714d664ec01a1065022878633bb40_JaffaCakes118

  • Size

    13KB

  • Sample

    240821-lm7bbsvfjj

  • MD5

    b2f714d664ec01a1065022878633bb40

  • SHA1

    0c3ecd15e3d7529bb8ef718461841ab99ffcb15b

  • SHA256

    bd0985023cea38e47dfe17cc9049fcc7a832b62b04c6988292921a7fdda7edef

  • SHA512

    4b055157990b09d97447fe5f3d142584079ca5034554f821a09f97246593539f13373252a1f4a1c8aa8560a9ade8fcf121b237cc4fb242552918167646efd075

  • SSDEEP

    384:NBXg69sWVUN6cK6adGYQ6R/LlTV7AN9kFfzpC:d9sWVq1ydGYQ4LlO9k1

Malware Config

Targets

    • Target

      b2f714d664ec01a1065022878633bb40_JaffaCakes118

    • Size

      13KB

    • MD5

      b2f714d664ec01a1065022878633bb40

    • SHA1

      0c3ecd15e3d7529bb8ef718461841ab99ffcb15b

    • SHA256

      bd0985023cea38e47dfe17cc9049fcc7a832b62b04c6988292921a7fdda7edef

    • SHA512

      4b055157990b09d97447fe5f3d142584079ca5034554f821a09f97246593539f13373252a1f4a1c8aa8560a9ade8fcf121b237cc4fb242552918167646efd075

    • SSDEEP

      384:NBXg69sWVUN6cK6adGYQ6R/LlTV7AN9kFfzpC:d9sWVq1ydGYQ4LlO9k1

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks