General

  • Target

    129b92d2272a2646326e890c0b2c1174_JaffaCakes118

  • Size

    28KB

  • Sample

    241004-kjamhsthqk

  • MD5

    129b92d2272a2646326e890c0b2c1174

  • SHA1

    1e9e09e7d58e177cd80f7df6ddffddbe98109bf9

  • SHA256

    b58f702816e2cd21dce3d38568663f0c11144fb82904f499b5fe32a7fe81b6d6

  • SHA512

    55ef38999cb2310aded63366f98c6aeed208d136fb78f02f0a3d58b75163e2bde248d7e6125da672b970a64faa087d8fca9153421a3087a29c348a0465ade99d

  • SSDEEP

    384:uQApLnxM9Ytx5CS8x7XYLPmn0/eyARl0+Y4Pl:QUY1CPSen0fcLY4

Malware Config

Targets

    • Target

      129b92d2272a2646326e890c0b2c1174_JaffaCakes118

    • Size

      28KB

    • MD5

      129b92d2272a2646326e890c0b2c1174

    • SHA1

      1e9e09e7d58e177cd80f7df6ddffddbe98109bf9

    • SHA256

      b58f702816e2cd21dce3d38568663f0c11144fb82904f499b5fe32a7fe81b6d6

    • SHA512

      55ef38999cb2310aded63366f98c6aeed208d136fb78f02f0a3d58b75163e2bde248d7e6125da672b970a64faa087d8fca9153421a3087a29c348a0465ade99d

    • SSDEEP

      384:uQApLnxM9Ytx5CS8x7XYLPmn0/eyARl0+Y4Pl:QUY1CPSen0fcLY4

    • Adds policy Run key to start application

    • Deletes itself

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks