General

  • Target

    0f6c2d9cf511a788cf20b9a042302ab4_JaffaCakes118

  • Size

    884KB

  • Sample

    241003-s4gwbsshkk

  • MD5

    0f6c2d9cf511a788cf20b9a042302ab4

  • SHA1

    df4843a85915b380b425762ddc19e7cf14e25c06

  • SHA256

    d0104c911c78e93901dbe6c18fbc9c45b7d360191c94bb26dbecf3d793741e53

  • SHA512

    ab98688d057cdb0c219f8acf050721fd4c14470d3cb692cbc46176fe1500e5c401382272c93283c476f031e2cb608ade118281c5d9d42adee35828a33eb67ca2

  • SSDEEP

    12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27QitjEc:r5sJo6YrFUiyAak11LtjEc

Malware Config

Targets

    • Target

      0f6c2d9cf511a788cf20b9a042302ab4_JaffaCakes118

    • Size

      884KB

    • MD5

      0f6c2d9cf511a788cf20b9a042302ab4

    • SHA1

      df4843a85915b380b425762ddc19e7cf14e25c06

    • SHA256

      d0104c911c78e93901dbe6c18fbc9c45b7d360191c94bb26dbecf3d793741e53

    • SHA512

      ab98688d057cdb0c219f8acf050721fd4c14470d3cb692cbc46176fe1500e5c401382272c93283c476f031e2cb608ade118281c5d9d42adee35828a33eb67ca2

    • SSDEEP

      12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27QitjEc:r5sJo6YrFUiyAak11LtjEc

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks