General

  • Target

    dd949de585ab8696828261fdad7d9671_JaffaCakes118

  • Size

    968KB

  • Sample

    240913-d2zk2asajn

  • MD5

    dd949de585ab8696828261fdad7d9671

  • SHA1

    dcf7661cbbe225ce19db07c465e450b736318b75

  • SHA256

    15020f5e36eff6bef91e824486a7a2dc250a2f430eff8f0501e4705795fb25c8

  • SHA512

    ee315f02ab07a4d6e08d7bb83c603b114e42acb8910959b146acf5c3177faeb5a99b347c5a0685904fb99b14def1c0db8f55939c33d31399749593b55895b768

  • SSDEEP

    24576:mhPsdNSO0olRITpLpkgSnqv1i5KmgNrXzGLl:SkdIDZRet5dgVjG

Malware Config

Targets

    • Target

      dd949de585ab8696828261fdad7d9671_JaffaCakes118

    • Size

      968KB

    • MD5

      dd949de585ab8696828261fdad7d9671

    • SHA1

      dcf7661cbbe225ce19db07c465e450b736318b75

    • SHA256

      15020f5e36eff6bef91e824486a7a2dc250a2f430eff8f0501e4705795fb25c8

    • SHA512

      ee315f02ab07a4d6e08d7bb83c603b114e42acb8910959b146acf5c3177faeb5a99b347c5a0685904fb99b14def1c0db8f55939c33d31399749593b55895b768

    • SSDEEP

      24576:mhPsdNSO0olRITpLpkgSnqv1i5KmgNrXzGLl:SkdIDZRet5dgVjG

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks