General

  • Target

    fa54d61d86d1576306972ecf9c73e2d4_JaffaCakes118

  • Size

    11KB

  • Sample

    240927-nqdvaszhqm

  • MD5

    fa54d61d86d1576306972ecf9c73e2d4

  • SHA1

    27c9f6fe4148bac5354a0b14d58721ed271f960a

  • SHA256

    7e0c4e1becffeee7b958ffb26291fb78f51df7d14f0127502154beb134af9307

  • SHA512

    8b8b252cd2ef21b4b4f98522343ce9aab4c03f7d46f94c35b8cb97f6bb1e6ec4a2930cdf8c9bf7e29d630fb450d50915bd822a742ac8276999ddfd004f33d1e6

  • SSDEEP

    192:XE4JgPu/PlfaC8NahI7yFJQT0V6RfCyG/B9ShZVuIaMAUaIGo7/r1Bclg:XE4WPOfarNa3JK0V5whGIahUaIGof8g

Malware Config

Targets

    • Target

      fa54d61d86d1576306972ecf9c73e2d4_JaffaCakes118

    • Size

      11KB

    • MD5

      fa54d61d86d1576306972ecf9c73e2d4

    • SHA1

      27c9f6fe4148bac5354a0b14d58721ed271f960a

    • SHA256

      7e0c4e1becffeee7b958ffb26291fb78f51df7d14f0127502154beb134af9307

    • SHA512

      8b8b252cd2ef21b4b4f98522343ce9aab4c03f7d46f94c35b8cb97f6bb1e6ec4a2930cdf8c9bf7e29d630fb450d50915bd822a742ac8276999ddfd004f33d1e6

    • SSDEEP

      192:XE4JgPu/PlfaC8NahI7yFJQT0V6RfCyG/B9ShZVuIaMAUaIGo7/r1Bclg:XE4WPOfarNa3JK0V5whGIahUaIGof8g

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.