General

  • Target

    bc215511334c91033fb971da67de9236_JaffaCakes118

  • Size

    11KB

  • Sample

    240823-rw14kasclj

  • MD5

    bc215511334c91033fb971da67de9236

  • SHA1

    039d8a8af8f60b2774fa0f356f2b61d6d82595f3

  • SHA256

    25ccf8b91d0a3f92259300c2f6bce25d3f76a3e4335e2fbbb72c4e49191fa916

  • SHA512

    c9e04db9c24b3a5d0dd40d7f494dd350fb2d8d1520dac890d1038672765728a353b52093539fce9f7d5c61eca39d75c19aeb678e9c7c9a8f3b53c2267d762a93

  • SSDEEP

    192:pONdyqMRQNfGvYVBsXqjwnSLBeP2taQXnfUmYnXA2cCB34TV1sWcT8g:pq01wO+WiDLBePqaOfJYnXA2vB34h1sx

Malware Config

Targets

    • Target

      bc215511334c91033fb971da67de9236_JaffaCakes118

    • Size

      11KB

    • MD5

      bc215511334c91033fb971da67de9236

    • SHA1

      039d8a8af8f60b2774fa0f356f2b61d6d82595f3

    • SHA256

      25ccf8b91d0a3f92259300c2f6bce25d3f76a3e4335e2fbbb72c4e49191fa916

    • SHA512

      c9e04db9c24b3a5d0dd40d7f494dd350fb2d8d1520dac890d1038672765728a353b52093539fce9f7d5c61eca39d75c19aeb678e9c7c9a8f3b53c2267d762a93

    • SSDEEP

      192:pONdyqMRQNfGvYVBsXqjwnSLBeP2taQXnfUmYnXA2cCB34TV1sWcT8g:pq01wO+WiDLBePqaOfJYnXA2vB34h1sx

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks