General

  • Target

    fb2d88828abf8db7b1ea1b772d2d7980_JaffaCakes118

  • Size

    11KB

  • Sample

    240928-avr1tsxepk

  • MD5

    fb2d88828abf8db7b1ea1b772d2d7980

  • SHA1

    bf329310dbad16ce1cb0fda4da61efee08627979

  • SHA256

    9e9d8f014d6b63b5399bc15fc864e77a5d0d032777c833ee152696fabe4092c7

  • SHA512

    ba0f5940efc801dbdf8fa27454b4992680774d7c1a0e8a06ff9708d77ee587609d23878663fad6f56a6c823c64c6f6586dd99361cadd35f6ac6d29188d4bda56

  • SSDEEP

    192:PGpWCnGSJWTipSdeeVRuyE6spTN3PuwtkJJWmBmBJ6EByDdoHCXRD:POmRzjspTZ0VmBJFByD3N

Malware Config

Targets

    • Target

      fb2d88828abf8db7b1ea1b772d2d7980_JaffaCakes118

    • Size

      11KB

    • MD5

      fb2d88828abf8db7b1ea1b772d2d7980

    • SHA1

      bf329310dbad16ce1cb0fda4da61efee08627979

    • SHA256

      9e9d8f014d6b63b5399bc15fc864e77a5d0d032777c833ee152696fabe4092c7

    • SHA512

      ba0f5940efc801dbdf8fa27454b4992680774d7c1a0e8a06ff9708d77ee587609d23878663fad6f56a6c823c64c6f6586dd99361cadd35f6ac6d29188d4bda56

    • SSDEEP

      192:PGpWCnGSJWTipSdeeVRuyE6spTN3PuwtkJJWmBmBJ6EByDdoHCXRD:POmRzjspTZ0VmBJFByD3N

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks