General

  • Target

    c7a4ae42e56b0f94d4ba91c7283c960f_JaffaCakes118

  • Size

    379KB

  • Sample

    240828-zthhfaxgkj

  • MD5

    c7a4ae42e56b0f94d4ba91c7283c960f

  • SHA1

    cc305cf94982178a98e4c0b03150d101cdb2dbfc

  • SHA256

    45ad19974dd26360c7b08654b66647befaab84d2ad7c1ac2cc4f8980e8b37c04

  • SHA512

    59daf955af7159c3e746f5daaa17feb732fbd64dbf25bab11439d3354244e2997aaf0d2ecfc9fc41cac3468fe0b485fdd01f4ea3ff736c4909a28139e7c88225

  • SSDEEP

    6144:RxrLAVGUiEAie31mHdcapKNSm1nqteNpprbi48fV3Lxn7+lCWyLoSp5ATu:/r47elmRSvnvFYxn7kCRoSz

Malware Config

Targets

    • Target

      c7a4ae42e56b0f94d4ba91c7283c960f_JaffaCakes118

    • Size

      379KB

    • MD5

      c7a4ae42e56b0f94d4ba91c7283c960f

    • SHA1

      cc305cf94982178a98e4c0b03150d101cdb2dbfc

    • SHA256

      45ad19974dd26360c7b08654b66647befaab84d2ad7c1ac2cc4f8980e8b37c04

    • SHA512

      59daf955af7159c3e746f5daaa17feb732fbd64dbf25bab11439d3354244e2997aaf0d2ecfc9fc41cac3468fe0b485fdd01f4ea3ff736c4909a28139e7c88225

    • SSDEEP

      6144:RxrLAVGUiEAie31mHdcapKNSm1nqteNpprbi48fV3Lxn7+lCWyLoSp5ATu:/r47elmRSvnvFYxn7kCRoSz

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks