General

  • Target

    eab8a85c6a4a4ae2d57413b6a908c5c6_JaffaCakes118

  • Size

    123KB

  • Sample

    240919-grt5cavapq

  • MD5

    eab8a85c6a4a4ae2d57413b6a908c5c6

  • SHA1

    03cceb721c67d09fae5d39a111da10c73a961b9a

  • SHA256

    609e570f84417499bee21be1c40cfcfaf683330c3df7a0f0c12355f242c21ff8

  • SHA512

    215b293b4fa2cadb6aca5f3ae3aa3706e8203a3a892219db5f7ae68de9bd7a30abbfe18b9626a070c5916c3c9aa28455ba55176c93f288c4d63803ba1d5d0339

  • SSDEEP

    3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLJBRo:OVYrJrOSsRwcppRo

Score
8/10

Malware Config

Targets

    • Target

      eab8a85c6a4a4ae2d57413b6a908c5c6_JaffaCakes118

    • Size

      123KB

    • MD5

      eab8a85c6a4a4ae2d57413b6a908c5c6

    • SHA1

      03cceb721c67d09fae5d39a111da10c73a961b9a

    • SHA256

      609e570f84417499bee21be1c40cfcfaf683330c3df7a0f0c12355f242c21ff8

    • SHA512

      215b293b4fa2cadb6aca5f3ae3aa3706e8203a3a892219db5f7ae68de9bd7a30abbfe18b9626a070c5916c3c9aa28455ba55176c93f288c4d63803ba1d5d0339

    • SSDEEP

      3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLJBRo:OVYrJrOSsRwcppRo

    Score
    8/10
    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks