General

  • Target

    d2fc07fe7958cb6e89deeac88de2d3a9_JaffaCakes118

  • Size

    183KB

  • Sample

    240907-2mxd5asanc

  • MD5

    d2fc07fe7958cb6e89deeac88de2d3a9

  • SHA1

    5655c08131da8a93e49fe3856329c3d0dd576fff

  • SHA256

    bddde7b79f8ed911f4ab3b108ca4003c889e8e6f3b9cd2c55eb9406e729458a0

  • SHA512

    3ce9fcadbfb915babddf73e86b7da1d3f09f6403e75ff5bd9bc739890e67ce97deb7b8436849254a7b4400a1537d95565c489aace6769804998fbde9f0a94fe8

  • SSDEEP

    3072:EamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqVC:Eazq3aipalYuhoao5sQkzcKrpe

Score
8/10

Malware Config

Targets

    • Target

      d2fc07fe7958cb6e89deeac88de2d3a9_JaffaCakes118

    • Size

      183KB

    • MD5

      d2fc07fe7958cb6e89deeac88de2d3a9

    • SHA1

      5655c08131da8a93e49fe3856329c3d0dd576fff

    • SHA256

      bddde7b79f8ed911f4ab3b108ca4003c889e8e6f3b9cd2c55eb9406e729458a0

    • SHA512

      3ce9fcadbfb915babddf73e86b7da1d3f09f6403e75ff5bd9bc739890e67ce97deb7b8436849254a7b4400a1537d95565c489aace6769804998fbde9f0a94fe8

    • SSDEEP

      3072:EamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqVC:Eazq3aipalYuhoao5sQkzcKrpe

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks