General

  • Target

    12dbb8db38a4a268b5ddee9975472582_JaffaCakes118

  • Size

    917KB

  • Sample

    241004-lykxgasakf

  • MD5

    12dbb8db38a4a268b5ddee9975472582

  • SHA1

    29ed41bd0dd82a4b15c11a2c4c5a41618b605407

  • SHA256

    db20bb1aeb54c3c065421144a2aa429100cd9b06e70f0d5d370e644ed9523bc0

  • SHA512

    1fcf85da3b7a6798b2cb3272ee7e45f54f2705e9d76c1e072dcb2455af9e81893e0a3f653d4c803bdb91085475dd34ade834f6fbe053b581d02c5a29975b8fd8

  • SSDEEP

    12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27QitjEc:r5sJo6YrFUiyAak11LtjEc

Malware Config

Targets

    • Target

      12dbb8db38a4a268b5ddee9975472582_JaffaCakes118

    • Size

      917KB

    • MD5

      12dbb8db38a4a268b5ddee9975472582

    • SHA1

      29ed41bd0dd82a4b15c11a2c4c5a41618b605407

    • SHA256

      db20bb1aeb54c3c065421144a2aa429100cd9b06e70f0d5d370e644ed9523bc0

    • SHA512

      1fcf85da3b7a6798b2cb3272ee7e45f54f2705e9d76c1e072dcb2455af9e81893e0a3f653d4c803bdb91085475dd34ade834f6fbe053b581d02c5a29975b8fd8

    • SSDEEP

      12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27QitjEc:r5sJo6YrFUiyAak11LtjEc

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks