General

  • Target

    ecb8a57b35fa998a9b07ef1ad71f67ed_JaffaCakes118

  • Size

    682KB

  • Sample

    240920-dkwg2svfrh

  • MD5

    ecb8a57b35fa998a9b07ef1ad71f67ed

  • SHA1

    9f2b669eb1bb50b04ce219aecba105186b5a0b99

  • SHA256

    28b33aa79db500ce23f75bd76753d47edac591749d02069d24a1c66be1fca899

  • SHA512

    e19b39cc3755b27653944b8a21c666936fd90c95e8c99ca5911dcec1d530c54c0374112ee721d4cf49b54fe7a4b2b5cb6327a3d489c3e311d0345d6311d9602e

  • SSDEEP

    12288:NL5mBXY5fLmy3xC0GCiZjt5j5wt17I+BJ1LLGqI3LhYBVM9XF:JSXWFxCXd5j5wtJBJ8fCg9V

Malware Config

Targets

    • Target

      ecb8a57b35fa998a9b07ef1ad71f67ed_JaffaCakes118

    • Size

      682KB

    • MD5

      ecb8a57b35fa998a9b07ef1ad71f67ed

    • SHA1

      9f2b669eb1bb50b04ce219aecba105186b5a0b99

    • SHA256

      28b33aa79db500ce23f75bd76753d47edac591749d02069d24a1c66be1fca899

    • SHA512

      e19b39cc3755b27653944b8a21c666936fd90c95e8c99ca5911dcec1d530c54c0374112ee721d4cf49b54fe7a4b2b5cb6327a3d489c3e311d0345d6311d9602e

    • SSDEEP

      12288:NL5mBXY5fLmy3xC0GCiZjt5j5wt17I+BJ1LLGqI3LhYBVM9XF:JSXWFxCXd5j5wtJBJ8fCg9V

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks