General

  • Target

    dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118

  • Size

    11KB

  • Sample

    240912-fszwjssfmg

  • MD5

    dbde69c8d7306fdf1f26b08a7e1a631a

  • SHA1

    3edcfc6330b324b6471e20f51e69c1ac821ffc30

  • SHA256

    f7a84a2593df03534f2d096c75509528ff1927157dc02e456f086d7459b4ee39

  • SHA512

    267b11db4312300f53ba0024e2a3dccf4c8e2343cb3b1e060bfdfd8dfcd325d270caad7e335c7ca368703e811a3233c91faf72d1990ab54867595bce6842a329

  • SSDEEP

    192:ANfmSO1JM6+wWtIlJHyFh7L+S2dlJx9CiL99P/lj2hsFlDdCNcVg:EmSO1JM6+wWyjS37CxFHC699B2odCSg

Malware Config

Targets

    • Target

      dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118

    • Size

      11KB

    • MD5

      dbde69c8d7306fdf1f26b08a7e1a631a

    • SHA1

      3edcfc6330b324b6471e20f51e69c1ac821ffc30

    • SHA256

      f7a84a2593df03534f2d096c75509528ff1927157dc02e456f086d7459b4ee39

    • SHA512

      267b11db4312300f53ba0024e2a3dccf4c8e2343cb3b1e060bfdfd8dfcd325d270caad7e335c7ca368703e811a3233c91faf72d1990ab54867595bce6842a329

    • SSDEEP

      192:ANfmSO1JM6+wWtIlJHyFh7L+S2dlJx9CiL99P/lj2hsFlDdCNcVg:EmSO1JM6+wWyjS37CxFHC699B2odCSg

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks