General

  • Target

    0fb7f423dfce5c27ac24b34c9c7d79ff_JaffaCakes118

  • Size

    115KB

  • Sample

    241003-vd4crazarf

  • MD5

    0fb7f423dfce5c27ac24b34c9c7d79ff

  • SHA1

    9dcf6141d53c7bc7b804a1e88044eb53630105bd

  • SHA256

    11cfe97d735c62a372366afb7955131dd71c0187ee19d4afa97ae5ed7282a05a

  • SHA512

    667095937712213035071eb099c87a4d4667d8a0c30c66c062bee1ce45010c7763fb0a33c0a81153f975b4ffab41e2004832dec3f649680380da05a35dd876df

  • SSDEEP

    768:7C1bCcGGwgkGY+T4QG5j0UZTuMzPpMA7H5n+39UBhwGH5ScyiJmg:GwmYBwCBH5nW0S

Score
7/10

Malware Config

Targets

    • Target

      0fb7f423dfce5c27ac24b34c9c7d79ff_JaffaCakes118

    • Size

      115KB

    • MD5

      0fb7f423dfce5c27ac24b34c9c7d79ff

    • SHA1

      9dcf6141d53c7bc7b804a1e88044eb53630105bd

    • SHA256

      11cfe97d735c62a372366afb7955131dd71c0187ee19d4afa97ae5ed7282a05a

    • SHA512

      667095937712213035071eb099c87a4d4667d8a0c30c66c062bee1ce45010c7763fb0a33c0a81153f975b4ffab41e2004832dec3f649680380da05a35dd876df

    • SSDEEP

      768:7C1bCcGGwgkGY+T4QG5j0UZTuMzPpMA7H5n+39UBhwGH5ScyiJmg:GwmYBwCBH5nW0S

    Score
    7/10
    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks