General

  • Target

    c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118

  • Size

    236KB

  • Sample

    240829-xjwk7sxhkq

  • MD5

    c96bed6bd7f5d8cc4e6c144771c46398

  • SHA1

    aa85cc2cfe327e02c6f8fd90029c77081b0c67bb

  • SHA256

    eeacc1258a40e39645f24018293e3371bf77cdb262763b27057a3ac5beff18cd

  • SHA512

    1ab061c6cabed0b4655bd68e09dafa076a3dd8b0cd40f9593864db7547881ce0eaccb7f4caceacb4b69d64d11645d964c92b63a220a1f1da4b3e1b2f754835e5

  • SSDEEP

    6144:ANUvUU3w6u0OSiiDjnoFCcfjXEEEAcONJ+iGnaC/g4TcG9z:A6sQwGXVjMlNUiGJ/g+cgz

Malware Config

Targets

    • Target

      c96bed6bd7f5d8cc4e6c144771c46398_JaffaCakes118

    • Size

      236KB

    • MD5

      c96bed6bd7f5d8cc4e6c144771c46398

    • SHA1

      aa85cc2cfe327e02c6f8fd90029c77081b0c67bb

    • SHA256

      eeacc1258a40e39645f24018293e3371bf77cdb262763b27057a3ac5beff18cd

    • SHA512

      1ab061c6cabed0b4655bd68e09dafa076a3dd8b0cd40f9593864db7547881ce0eaccb7f4caceacb4b69d64d11645d964c92b63a220a1f1da4b3e1b2f754835e5

    • SSDEEP

      6144:ANUvUU3w6u0OSiiDjnoFCcfjXEEEAcONJ+iGnaC/g4TcG9z:A6sQwGXVjMlNUiGJ/g+cgz

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks