General

  • Target

    0738d21ebf465ef705c19103c4dae924_JaffaCakes118

  • Size

    52KB

  • Sample

    241001-ysvkya1hlh

  • MD5

    0738d21ebf465ef705c19103c4dae924

  • SHA1

    bb65da4ce900cfd207399245872efde3b271767a

  • SHA256

    05cb70e569480cbdd311b9f737ad03e192f54f628b19fe1247feb0a642442bb6

  • SHA512

    65cce8aca3579b81253aeba1c10b9ae74e7be9bd3f1ebe8a28d31a423c579bf7abeb2bf646a980dbea1b75126809c146b82aba44b0f47cc8ca86a3befe07c968

  • SSDEEP

    1536:lWkwJZTWUtVFSKEQqw1/WG6Eoxp8lxDDwOQPhHYiOzN:oHJ9WUfhr04DXQWiOx

Malware Config

Targets

    • Target

      0738d21ebf465ef705c19103c4dae924_JaffaCakes118

    • Size

      52KB

    • MD5

      0738d21ebf465ef705c19103c4dae924

    • SHA1

      bb65da4ce900cfd207399245872efde3b271767a

    • SHA256

      05cb70e569480cbdd311b9f737ad03e192f54f628b19fe1247feb0a642442bb6

    • SHA512

      65cce8aca3579b81253aeba1c10b9ae74e7be9bd3f1ebe8a28d31a423c579bf7abeb2bf646a980dbea1b75126809c146b82aba44b0f47cc8ca86a3befe07c968

    • SSDEEP

      1536:lWkwJZTWUtVFSKEQqw1/WG6Eoxp8lxDDwOQPhHYiOzN:oHJ9WUfhr04DXQWiOx

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks