General

  • Target

    dd064d8db1e9d7171d0d5343e41ea976_JaffaCakes118

  • Size

    399KB

  • Sample

    240912-zlxx6athra

  • MD5

    dd064d8db1e9d7171d0d5343e41ea976

  • SHA1

    bac6dbdfe093f00209f9ec11491924083c92932d

  • SHA256

    9a46f2110fc37139aab92099d370c95f7e15238735b5fe19dd538c200a0152e4

  • SHA512

    c2ebc89f54d4d7fefac473e344794fb9f90223d25e24790637f44d02ff6fcfd84bcb4b973e75037b45f23f9a9d08efe20b4d22d48c84eebb37e3247b1f4cca6b

  • SSDEEP

    6144:7HArePp1FfINYC/hsjsrAY6Ic/8jrKEFDcmvKQbERvdestcWjl7:7grePdHQhs71IS8jrKEnxS1Zt7jl7

Malware Config

Targets

    • Target

      dd064d8db1e9d7171d0d5343e41ea976_JaffaCakes118

    • Size

      399KB

    • MD5

      dd064d8db1e9d7171d0d5343e41ea976

    • SHA1

      bac6dbdfe093f00209f9ec11491924083c92932d

    • SHA256

      9a46f2110fc37139aab92099d370c95f7e15238735b5fe19dd538c200a0152e4

    • SHA512

      c2ebc89f54d4d7fefac473e344794fb9f90223d25e24790637f44d02ff6fcfd84bcb4b973e75037b45f23f9a9d08efe20b4d22d48c84eebb37e3247b1f4cca6b

    • SSDEEP

      6144:7HArePp1FfINYC/hsjsrAY6Ic/8jrKEFDcmvKQbERvdestcWjl7:7grePdHQhs71IS8jrKEnxS1Zt7jl7

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks