General

  • Target

    f5872d0822d6722780b8c7968834d102_JaffaCakes118

  • Size

    12KB

  • Sample

    240925-jmhlvstcnp

  • MD5

    f5872d0822d6722780b8c7968834d102

  • SHA1

    a45af00070027ab961267bb718f42b9b7d4da673

  • SHA256

    8364bf90f2076d0c115abd6f1e545209c4e051ff4d5a8e639813b00905f99a3b

  • SHA512

    88bc35bffd9e0d65584ea39521cf3049081ef66d0bcbb5b3136c7f0648dfd5a950edc26dbe816e4913515d9f0efd73f88fdf2988765dadd24003c1abd9b69840

  • SSDEEP

    192:OCfMTmJFxka1g+5dSI/6PRu++LqB2D+K9TjvB29AidBTkWSOu:OCfRFSe+u6PRhtRdBlSL

Malware Config

Targets

    • Target

      f5872d0822d6722780b8c7968834d102_JaffaCakes118

    • Size

      12KB

    • MD5

      f5872d0822d6722780b8c7968834d102

    • SHA1

      a45af00070027ab961267bb718f42b9b7d4da673

    • SHA256

      8364bf90f2076d0c115abd6f1e545209c4e051ff4d5a8e639813b00905f99a3b

    • SHA512

      88bc35bffd9e0d65584ea39521cf3049081ef66d0bcbb5b3136c7f0648dfd5a950edc26dbe816e4913515d9f0efd73f88fdf2988765dadd24003c1abd9b69840

    • SSDEEP

      192:OCfMTmJFxka1g+5dSI/6PRu++LqB2D+K9TjvB29AidBTkWSOu:OCfRFSe+u6PRhtRdBlSL

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks