General

  • Target

    ff89e9169687332e9360f1a694278a10_JaffaCakes118

  • Size

    11KB

  • Sample

    240930-aalnba1dlf

  • MD5

    ff89e9169687332e9360f1a694278a10

  • SHA1

    f5ea43d1e94296689f80c34258d0ebfdedab533b

  • SHA256

    5673481c653be0484585f1ebce29baf4ff45b607f09e6dc6d693c3ca814924d9

  • SHA512

    6066e4ab8e3f5c74d9c3478d86de426c2662d5f598f630aa1bcf34d8a66e24bc4436fc34de0ce95d75440a7e38a493bce88f874dd10548f5d8262ff255ca85bf

  • SSDEEP

    192:7jkXtnWf2btPDJMFks0FuMaytysJ29Be6/8vfie57STKrvdSQbRgd:HkdnWf2bdqk+Fe6/kfiexAKbd/gd

Malware Config

Targets

    • Target

      ff89e9169687332e9360f1a694278a10_JaffaCakes118

    • Size

      11KB

    • MD5

      ff89e9169687332e9360f1a694278a10

    • SHA1

      f5ea43d1e94296689f80c34258d0ebfdedab533b

    • SHA256

      5673481c653be0484585f1ebce29baf4ff45b607f09e6dc6d693c3ca814924d9

    • SHA512

      6066e4ab8e3f5c74d9c3478d86de426c2662d5f598f630aa1bcf34d8a66e24bc4436fc34de0ce95d75440a7e38a493bce88f874dd10548f5d8262ff255ca85bf

    • SSDEEP

      192:7jkXtnWf2btPDJMFks0FuMaytysJ29Be6/8vfie57STKrvdSQbRgd:HkdnWf2bdqk+Fe6/kfiexAKbd/gd

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks