General

  • Target

    11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118

  • Size

    72KB

  • Sample

    241004-fx5mlawdrr

  • MD5

    11fc4ed7f48d160cb6b31bd024368a62

  • SHA1

    8b974d765f65fc8cc5d1d3e3d825c7c7eb71e177

  • SHA256

    cd4438b64175fd5321b7782f890e199c94d96f3626a60b2c37e5a45a1773886d

  • SHA512

    002dd7773fc37ec9026caeae929fc7feb3d715fa7a684e202ef2694d45da25872a1afb5d2bde7b61cf19177808b62f871056ca9aa03afe4771744822613ddade

  • SSDEEP

    768:rJHiEaq8TU2F99G218OrzlgTScp1U1vhBqgAUAas4hefyT2t6VtM:r9iqIFLn+TDPU1ZoTwey1Vt

Malware Config

Targets

    • Target

      11fc4ed7f48d160cb6b31bd024368a62_JaffaCakes118

    • Size

      72KB

    • MD5

      11fc4ed7f48d160cb6b31bd024368a62

    • SHA1

      8b974d765f65fc8cc5d1d3e3d825c7c7eb71e177

    • SHA256

      cd4438b64175fd5321b7782f890e199c94d96f3626a60b2c37e5a45a1773886d

    • SHA512

      002dd7773fc37ec9026caeae929fc7feb3d715fa7a684e202ef2694d45da25872a1afb5d2bde7b61cf19177808b62f871056ca9aa03afe4771744822613ddade

    • SSDEEP

      768:rJHiEaq8TU2F99G218OrzlgTScp1U1vhBqgAUAas4hefyT2t6VtM:r9iqIFLn+TDPU1ZoTwey1Vt

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks