General

  • Target

    cde62035d367086bf018322cea753c7f_JaffaCakes118

  • Size

    214KB

  • Sample

    240901-a38csavelk

  • MD5

    cde62035d367086bf018322cea753c7f

  • SHA1

    8af17d756277288421b588a7c96378ded7b8bf19

  • SHA256

    32a8ebd0557e12dc7814bd00de287c4d7e269959c7777f8ce6c80092f67139f8

  • SHA512

    b08abee51d534aa31cdbbbf0af14f36da34916a4e3bb67406309eb3220e2ff38803921af7aa6206addfc9b87f1abf5239970ccfc4d59cec81b735818e4348ce9

  • SSDEEP

    6144:T6CBZxIoCqeI8QQngxG9xOC35WmnqHLtOy:HBZxRlexEk98YiF

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://95.211.27.154/install.php?id=02901

Extracted

Language
hta
Source
URLs
hta.dropper

http://urodinam.net/8732489273.php

Targets

    • Target

      cde62035d367086bf018322cea753c7f_JaffaCakes118

    • Size

      214KB

    • MD5

      cde62035d367086bf018322cea753c7f

    • SHA1

      8af17d756277288421b588a7c96378ded7b8bf19

    • SHA256

      32a8ebd0557e12dc7814bd00de287c4d7e269959c7777f8ce6c80092f67139f8

    • SHA512

      b08abee51d534aa31cdbbbf0af14f36da34916a4e3bb67406309eb3220e2ff38803921af7aa6206addfc9b87f1abf5239970ccfc4d59cec81b735818e4348ce9

    • SSDEEP

      6144:T6CBZxIoCqeI8QQngxG9xOC35WmnqHLtOy:HBZxRlexEk98YiF

    Score
    10/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks