General

  • Target

    bcf067f5f443d64500b083614b56b49d_JaffaCakes118

  • Size

    333KB

  • Sample

    240823-ymf6csshpg

  • MD5

    bcf067f5f443d64500b083614b56b49d

  • SHA1

    96dbc9663d621da4961bf06122bca18d032f71f5

  • SHA256

    a1e3fc3af4a3a6f8a33bf46867ce07e24ea158cff4cc2857e155fa4f51e16f34

  • SHA512

    100957b6eb3e4bb125444df548c0463df56e496b324128b35767ce03e1e28c375c8e8aa7d51dbc26d519f187b5b1196ca615e90357c80a472ff66e825cfb8b52

  • SSDEEP

    6144:G39Nx/7jpOqn4kbVT8jDL+hiScSeZrqYEk1mwEVEP:4z17FOGbVT8jDLAiMDWQV+

Malware Config

Targets

    • Target

      bcf067f5f443d64500b083614b56b49d_JaffaCakes118

    • Size

      333KB

    • MD5

      bcf067f5f443d64500b083614b56b49d

    • SHA1

      96dbc9663d621da4961bf06122bca18d032f71f5

    • SHA256

      a1e3fc3af4a3a6f8a33bf46867ce07e24ea158cff4cc2857e155fa4f51e16f34

    • SHA512

      100957b6eb3e4bb125444df548c0463df56e496b324128b35767ce03e1e28c375c8e8aa7d51dbc26d519f187b5b1196ca615e90357c80a472ff66e825cfb8b52

    • SSDEEP

      6144:G39Nx/7jpOqn4kbVT8jDL+hiScSeZrqYEk1mwEVEP:4z17FOGbVT8jDLAiMDWQV+

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks