General

  • Target

    ec881c7c25a55a30086439602df7e41e_JaffaCakes118

  • Size

    120KB

  • Sample

    240920-bdrt6szhme

  • MD5

    ec881c7c25a55a30086439602df7e41e

  • SHA1

    153f4f338dbbc0ceb1edfc792d1fd454b35976c6

  • SHA256

    a5c3424f2bd3b1ce742d4b8e66289e5a84f30b0d491109f317bfc1f819833e18

  • SHA512

    1842ba0a21f9448b1601db3cc3440622e351727e730923c725f6e582cc62ab8a237ab440d20e705198b0e30f9fac8b06d63855fd6b03e281956cf48d978d51c0

  • SSDEEP

    3072:z4R+IHUDKOjxXkAjZUA1qPH0kDAhvJ1YOAzCdTDwtuRKg0pfR:z4RrUOXAtz7AzCdQcL0N

Malware Config

Targets

    • Target

      ec881c7c25a55a30086439602df7e41e_JaffaCakes118

    • Size

      120KB

    • MD5

      ec881c7c25a55a30086439602df7e41e

    • SHA1

      153f4f338dbbc0ceb1edfc792d1fd454b35976c6

    • SHA256

      a5c3424f2bd3b1ce742d4b8e66289e5a84f30b0d491109f317bfc1f819833e18

    • SHA512

      1842ba0a21f9448b1601db3cc3440622e351727e730923c725f6e582cc62ab8a237ab440d20e705198b0e30f9fac8b06d63855fd6b03e281956cf48d978d51c0

    • SSDEEP

      3072:z4R+IHUDKOjxXkAjZUA1qPH0kDAhvJ1YOAzCdTDwtuRKg0pfR:z4RrUOXAtz7AzCdQcL0N

    • Modifies WinLogon for persistence

    • Event Triggered Execution: Image File Execution Options Injection

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks