General

  • Target

    da9c82dfa6c74fd7ddabfa08b4e97785_JaffaCakes118

  • Size

    416KB

  • Sample

    240911-sgr3saxbnj

  • MD5

    da9c82dfa6c74fd7ddabfa08b4e97785

  • SHA1

    25b5738d597afce163289d8814c13c1fdeab878f

  • SHA256

    b876c8f7c668fbb42dd064d66358fea8bc2ee6593ada14a44a72289d49760474

  • SHA512

    deee118b7b2833d4f602e65aca1500f5a6aa1461fb12ba4de4ee8f287345588733c08c470836b87b2b8d30d3cfca7f6b26d1fa896e42529e1c576b03a0a78608

  • SSDEEP

    12288:IZ6TIoft2yugll2jnAaeX6mXM3W4/Plf:IZ6glQlCn0X6X3WoNf

Malware Config

Targets

    • Target

      da9c82dfa6c74fd7ddabfa08b4e97785_JaffaCakes118

    • Size

      416KB

    • MD5

      da9c82dfa6c74fd7ddabfa08b4e97785

    • SHA1

      25b5738d597afce163289d8814c13c1fdeab878f

    • SHA256

      b876c8f7c668fbb42dd064d66358fea8bc2ee6593ada14a44a72289d49760474

    • SHA512

      deee118b7b2833d4f602e65aca1500f5a6aa1461fb12ba4de4ee8f287345588733c08c470836b87b2b8d30d3cfca7f6b26d1fa896e42529e1c576b03a0a78608

    • SSDEEP

      12288:IZ6TIoft2yugll2jnAaeX6mXM3W4/Plf:IZ6glQlCn0X6X3WoNf

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks