General

  • Target

    e10c099cd08122c34707a9970c20b768_JaffaCakes118

  • Size

    183KB

  • Sample

    240914-z25ypswfrm

  • MD5

    e10c099cd08122c34707a9970c20b768

  • SHA1

    559e9b20967042986136c8ef1ba342d4b271bfa3

  • SHA256

    77462320bb5ff7177acf54ee8ec1dfef10cbe5a0385260046d4b0c3c9bd77d4a

  • SHA512

    88d2013ecabafb517cf9c3ffa4e407fd15e1f05f858b1072c6c39267d098c246a57efcea0a27b501092a148e2209095ab975d9ffa26444b11759d6d53078bdb3

  • SSDEEP

    3072:kamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqV5:kazq3aipalYuhoao5sQkzgsyU

Score
8/10

Malware Config

Targets

    • Target

      e10c099cd08122c34707a9970c20b768_JaffaCakes118

    • Size

      183KB

    • MD5

      e10c099cd08122c34707a9970c20b768

    • SHA1

      559e9b20967042986136c8ef1ba342d4b271bfa3

    • SHA256

      77462320bb5ff7177acf54ee8ec1dfef10cbe5a0385260046d4b0c3c9bd77d4a

    • SHA512

      88d2013ecabafb517cf9c3ffa4e407fd15e1f05f858b1072c6c39267d098c246a57efcea0a27b501092a148e2209095ab975d9ffa26444b11759d6d53078bdb3

    • SSDEEP

      3072:kamFnQYUM6m3SP2sVSdEnfWZN3cbgonk9sX1qalYuhLJNdjQVVTuP5J85Vi9iqV5:kazq3aipalYuhoao5sQkzgsyU

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks