General

  • Target

    ced30f4182d4530d323ffcd4194bd541_JaffaCakes118

  • Size

    93KB

  • Sample

    240906-gmlx6szerd

  • MD5

    ced30f4182d4530d323ffcd4194bd541

  • SHA1

    dfac384eaf0ab98d736a1134b07c1e8eed1cfffe

  • SHA256

    2b64077aac95a7475ee5c437448dcf4fda83d87bfc34152e41b04d52b6a9a21c

  • SHA512

    a275736c27bea2cfd2b73062995b8dcbb05b37c3251b5e8fef5e987caad65b96736ff6cb8b444d47caee110743e64ef9cc7bfdf1e4c4fee0c6892ae8c203b918

  • SSDEEP

    1536:8ao1JfFpZp8aN9/4Kq9ymJZXD12yHM83CYxYBfB0F/3zlU406syGRREXc32:8aojfZp8aD49t3XDsyMVBfiF/3z1068+

Malware Config

Targets

    • Target

      ced30f4182d4530d323ffcd4194bd541_JaffaCakes118

    • Size

      93KB

    • MD5

      ced30f4182d4530d323ffcd4194bd541

    • SHA1

      dfac384eaf0ab98d736a1134b07c1e8eed1cfffe

    • SHA256

      2b64077aac95a7475ee5c437448dcf4fda83d87bfc34152e41b04d52b6a9a21c

    • SHA512

      a275736c27bea2cfd2b73062995b8dcbb05b37c3251b5e8fef5e987caad65b96736ff6cb8b444d47caee110743e64ef9cc7bfdf1e4c4fee0c6892ae8c203b918

    • SSDEEP

      1536:8ao1JfFpZp8aN9/4Kq9ymJZXD12yHM83CYxYBfB0F/3zlU406syGRREXc32:8aojfZp8aD49t3XDsyMVBfiF/3z1068+

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks