General

  • Target

    fc7f9901dbf56c8f70a3a43d9a5d1534_JaffaCakes118

  • Size

    15KB

  • Sample

    240928-rwqylatbmg

  • MD5

    fc7f9901dbf56c8f70a3a43d9a5d1534

  • SHA1

    02e65ad4aea8dd85d9102c30a110a22275c4e86f

  • SHA256

    d879fddb575b66d6347febd2331ea55f4d9d510250390768b269cf0a9c6a7426

  • SHA512

    fc317b2626aaa104e4abe7501a088760e99829a5bc22e19960b9f1d1861143652d36d0ba38fadc63aa98fc07066a17887428ab8eab0798d45bdce7f6440eb938

  • SSDEEP

    384:qyNTmuc1BaZXNyBChlcf4c0zoBRhP1xeecntMMDB/:qMmu6BkXN4Chlcf47oDhP1xfcN

Malware Config

Targets

    • Target

      fc7f9901dbf56c8f70a3a43d9a5d1534_JaffaCakes118

    • Size

      15KB

    • MD5

      fc7f9901dbf56c8f70a3a43d9a5d1534

    • SHA1

      02e65ad4aea8dd85d9102c30a110a22275c4e86f

    • SHA256

      d879fddb575b66d6347febd2331ea55f4d9d510250390768b269cf0a9c6a7426

    • SHA512

      fc317b2626aaa104e4abe7501a088760e99829a5bc22e19960b9f1d1861143652d36d0ba38fadc63aa98fc07066a17887428ab8eab0798d45bdce7f6440eb938

    • SSDEEP

      384:qyNTmuc1BaZXNyBChlcf4c0zoBRhP1xeecntMMDB/:qMmu6BkXN4Chlcf47oDhP1xfcN

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks