General

  • Target

    c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118

  • Size

    12KB

  • Sample

    240826-jdlxxstfkl

  • MD5

    c28b048c1087a2c39d4b869fd952d6a0

  • SHA1

    d13971faa15d2da66ea67e8318ba1895c579d42d

  • SHA256

    dcb004958684cb218167a7193de22fbf98fab69b8d37cdf5260133fe667d501f

  • SHA512

    94f584f57ed53fc67ae181661b7f105c4506c7f0184942c889d498a8a3458fd2598854e7f1a49506965f6804395c815150c9550eeaa017e862e5a306e61a1319

  • SSDEEP

    384:xJfde4ojujuN1KisxnHB9NogEuuLiStgh:xJfde4rYN0giS6

Malware Config

Targets

    • Target

      c28b048c1087a2c39d4b869fd952d6a0_JaffaCakes118

    • Size

      12KB

    • MD5

      c28b048c1087a2c39d4b869fd952d6a0

    • SHA1

      d13971faa15d2da66ea67e8318ba1895c579d42d

    • SHA256

      dcb004958684cb218167a7193de22fbf98fab69b8d37cdf5260133fe667d501f

    • SHA512

      94f584f57ed53fc67ae181661b7f105c4506c7f0184942c889d498a8a3458fd2598854e7f1a49506965f6804395c815150c9550eeaa017e862e5a306e61a1319

    • SSDEEP

      384:xJfde4ojujuN1KisxnHB9NogEuuLiStgh:xJfde4rYN0giS6

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks