General

  • Target

    02122951aa7847cb407462539f3a81dd_JaffaCakes118

  • Size

    158KB

  • Sample

    240930-syhwfasflq

  • MD5

    02122951aa7847cb407462539f3a81dd

  • SHA1

    d3f1cb290e0040eb55f6c1d9c62e9200577c03bb

  • SHA256

    79570fdec74de86c42b4e3f5f068e9b11713fc4a7767b3e0749a338246a61560

  • SHA512

    0eb7297e1c414ba3ed006d6a3f68b9be65f20364e0835e9869147932b6c48f914c3440f50de2b4b7e9585de4cb93be193ee36b6988b544b6a9740bfd0ee4430d

  • SSDEEP

    3072:IzW+DiW9iLo+GnHv5uBagqRBINsDoAkU9xm2cxmf+:LKELo72HiYsDoAkUDm2W

Malware Config

Targets

    • Target

      02122951aa7847cb407462539f3a81dd_JaffaCakes118

    • Size

      158KB

    • MD5

      02122951aa7847cb407462539f3a81dd

    • SHA1

      d3f1cb290e0040eb55f6c1d9c62e9200577c03bb

    • SHA256

      79570fdec74de86c42b4e3f5f068e9b11713fc4a7767b3e0749a338246a61560

    • SHA512

      0eb7297e1c414ba3ed006d6a3f68b9be65f20364e0835e9869147932b6c48f914c3440f50de2b4b7e9585de4cb93be193ee36b6988b544b6a9740bfd0ee4430d

    • SSDEEP

      3072:IzW+DiW9iLo+GnHv5uBagqRBINsDoAkU9xm2cxmf+:LKELo72HiYsDoAkUDm2W

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks