General

  • Target

    c2304998cce6879d26d86437a69f4742_JaffaCakes118

  • Size

    12KB

  • Sample

    240826-dy3taatemr

  • MD5

    c2304998cce6879d26d86437a69f4742

  • SHA1

    b5a4e1d227bc2a4d9c989b593e2eee0843e46072

  • SHA256

    09e23650a8f60dbe39dbe8b9f272c89509d183574dacf640b79470109a037cf7

  • SHA512

    1a96bc14a1906416f1d2d3d4e17dfbc5c3cac97e889ca24d126f10581834a0f2278423f8b67595ca485eafd90086dd96b339d6fca7815689045879ded743b1eb

  • SSDEEP

    192:gdhkC/uiOtfuN1RL0tfFIvyW/QDicZaTl6cul+Y7pUaUw19s7LwwjPg:mhkC/xQfu90t6Kih6NYY7ytoinwwzg

Malware Config

Targets

    • Target

      c2304998cce6879d26d86437a69f4742_JaffaCakes118

    • Size

      12KB

    • MD5

      c2304998cce6879d26d86437a69f4742

    • SHA1

      b5a4e1d227bc2a4d9c989b593e2eee0843e46072

    • SHA256

      09e23650a8f60dbe39dbe8b9f272c89509d183574dacf640b79470109a037cf7

    • SHA512

      1a96bc14a1906416f1d2d3d4e17dfbc5c3cac97e889ca24d126f10581834a0f2278423f8b67595ca485eafd90086dd96b339d6fca7815689045879ded743b1eb

    • SSDEEP

      192:gdhkC/uiOtfuN1RL0tfFIvyW/QDicZaTl6cul+Y7pUaUw19s7LwwjPg:mhkC/xQfu90t6Kih6NYY7ytoinwwzg

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks