General

  • Target

    ea99435df70935d1b2171bca79c31a0b_JaffaCakes118

  • Size

    11KB

  • Sample

    240919-e9b1da1gnp

  • MD5

    ea99435df70935d1b2171bca79c31a0b

  • SHA1

    8e892ace8abb5380e7b75a64bc771c00c60f06ed

  • SHA256

    badace7712a39b1a5481767b544d84c88673a6888d9dbfb89e094e09d528c288

  • SHA512

    c1c846e54c585a51a085259be314f0cc9e781817195b217c16306376b148de0e62265a3083dba08a5385dc988972766f112c649cd45c85931dd903d3dd4a725c

  • SSDEEP

    192:Xe24k6QgGGIpTBLPOjxrOdK8iveWnCMd7NJ:XF4kYGGIpTB7exrD1z

Malware Config

Targets

    • Target

      ea99435df70935d1b2171bca79c31a0b_JaffaCakes118

    • Size

      11KB

    • MD5

      ea99435df70935d1b2171bca79c31a0b

    • SHA1

      8e892ace8abb5380e7b75a64bc771c00c60f06ed

    • SHA256

      badace7712a39b1a5481767b544d84c88673a6888d9dbfb89e094e09d528c288

    • SHA512

      c1c846e54c585a51a085259be314f0cc9e781817195b217c16306376b148de0e62265a3083dba08a5385dc988972766f112c649cd45c85931dd903d3dd4a725c

    • SSDEEP

      192:Xe24k6QgGGIpTBLPOjxrOdK8iveWnCMd7NJ:XF4kYGGIpTB7exrD1z

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks