General

  • Target

    bf911ebaac0bd0cdbf90b35c2db17b52_JaffaCakes118

  • Size

    110KB

  • Sample

    240824-2lp9estdjb

  • MD5

    bf911ebaac0bd0cdbf90b35c2db17b52

  • SHA1

    c13224bfa759811bebbe4a0c2c5c9f8f389312be

  • SHA256

    fb6188e874db53e0c95e2f2cb0bc320e17ae301da398fac07e8033668e3d5c2d

  • SHA512

    41e8410446b280142d75a17e4955bd03ba36f83637ab6d2880c9fbb1773dddb00f768eb8ab45b957247336168de46652bfe42310d7c2ad25fbc6cb25a0906bb6

  • SSDEEP

    3072:gEf/FHBFV6bbVtqVDs2aXl4HBrwW7ePTxL:JNHTVkVGZJF6rZ

Malware Config

Targets

    • Target

      bf911ebaac0bd0cdbf90b35c2db17b52_JaffaCakes118

    • Size

      110KB

    • MD5

      bf911ebaac0bd0cdbf90b35c2db17b52

    • SHA1

      c13224bfa759811bebbe4a0c2c5c9f8f389312be

    • SHA256

      fb6188e874db53e0c95e2f2cb0bc320e17ae301da398fac07e8033668e3d5c2d

    • SHA512

      41e8410446b280142d75a17e4955bd03ba36f83637ab6d2880c9fbb1773dddb00f768eb8ab45b957247336168de46652bfe42310d7c2ad25fbc6cb25a0906bb6

    • SSDEEP

      3072:gEf/FHBFV6bbVtqVDs2aXl4HBrwW7ePTxL:JNHTVkVGZJF6rZ

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks