General

  • Target

    c7e2db0ef45c809fffe9058fdd0949a8_JaffaCakes118

  • Size

    829KB

  • Sample

    240829-ab2qxstbqa

  • MD5

    c7e2db0ef45c809fffe9058fdd0949a8

  • SHA1

    3323f43ec90c5f63c4338786afa45f706ade3488

  • SHA256

    830e0e51aa100bdeba183c049117e6b6f8e7463a99d95ef92a9907df29dfc409

  • SHA512

    f18ea8d0e3619472ffd356932cdaa16241fcc9d771df5666d9d58279aca59a7fd99f2c96750655445f1c1a06a063f3bcff50b0c497350eb65795028e71d49170

  • SSDEEP

    24576:Tb4WNHG1f/zBYhG0gDAuzl6B7JS15h7GYE:TcwGRz70uAuJ6BtS/c

Malware Config

Targets

    • Target

      c7e2db0ef45c809fffe9058fdd0949a8_JaffaCakes118

    • Size

      829KB

    • MD5

      c7e2db0ef45c809fffe9058fdd0949a8

    • SHA1

      3323f43ec90c5f63c4338786afa45f706ade3488

    • SHA256

      830e0e51aa100bdeba183c049117e6b6f8e7463a99d95ef92a9907df29dfc409

    • SHA512

      f18ea8d0e3619472ffd356932cdaa16241fcc9d771df5666d9d58279aca59a7fd99f2c96750655445f1c1a06a063f3bcff50b0c497350eb65795028e71d49170

    • SSDEEP

      24576:Tb4WNHG1f/zBYhG0gDAuzl6B7JS15h7GYE:TcwGRz70uAuJ6BtS/c

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks