General

  • Target

    ea6e5c587902085e0dafbefb67ea2f3b_JaffaCakes118

  • Size

    680KB

  • Sample

    240919-c4r4aswgna

  • MD5

    ea6e5c587902085e0dafbefb67ea2f3b

  • SHA1

    fa063a6ef17fe92f939e0cb5a660f0a10bb1801e

  • SHA256

    14b48384371823a12716bdba512c95874a2116daceb905ffd06f1fd5528ca4d1

  • SHA512

    cbead4b4f2c27e1e736a4b11ac7907dc8b9eaac3b2c077cf21c70f7ffafa19fc5b3809ad1d53414eb64ad067ca1fe6cca87fe9d05cc0d15c3bff163e29ed41ae

  • SSDEEP

    12288:TRO2Q8Iu71MZvr2ymO6l4S+obhFIVgFmO/oG3G+zQmS+Lrv7KXpQB9EzDk8BAZ0H:Fm88Kjh4SnbMKFmO/osPTS8v7KXpQBq/

Score
7/10

Malware Config

Targets

    • Target

      ea6e5c587902085e0dafbefb67ea2f3b_JaffaCakes118

    • Size

      680KB

    • MD5

      ea6e5c587902085e0dafbefb67ea2f3b

    • SHA1

      fa063a6ef17fe92f939e0cb5a660f0a10bb1801e

    • SHA256

      14b48384371823a12716bdba512c95874a2116daceb905ffd06f1fd5528ca4d1

    • SHA512

      cbead4b4f2c27e1e736a4b11ac7907dc8b9eaac3b2c077cf21c70f7ffafa19fc5b3809ad1d53414eb64ad067ca1fe6cca87fe9d05cc0d15c3bff163e29ed41ae

    • SSDEEP

      12288:TRO2Q8Iu71MZvr2ymO6l4S+obhFIVgFmO/oG3G+zQmS+Lrv7KXpQB9EzDk8BAZ0H:Fm88Kjh4SnbMKFmO/osPTS8v7KXpQBq/

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks