General

  • Target

    182406af48b2292c5ec39959cf61f3a8_JaffaCakes118

  • Size

    93KB

  • Sample

    241006-p1ed9avbmk

  • MD5

    182406af48b2292c5ec39959cf61f3a8

  • SHA1

    aee61571d59a78ff9dc9cb7c7a60e69c9dfbcab3

  • SHA256

    b0bc6e1b5cf1987fa6301e836d3b9981bd62299434436c58829214e13937d327

  • SHA512

    5c379038ce3733a23fd0ce82906288d20192ae99d648ed129f1af096c19aef976844640b5dac738da53c930e1920f6f7d0839e06392927f8bbb433b13f2b9a17

  • SSDEEP

    1536:1RxzO/8Vc2S6aoWMzyin8YSHAU3AJnLqnw/q+T+Ff8BB3KI9M4+/ouT0Cj8F:r1O/8Zzyi8Y/U3S+mBB3KIY0g8F

Malware Config

Targets

    • Target

      182406af48b2292c5ec39959cf61f3a8_JaffaCakes118

    • Size

      93KB

    • MD5

      182406af48b2292c5ec39959cf61f3a8

    • SHA1

      aee61571d59a78ff9dc9cb7c7a60e69c9dfbcab3

    • SHA256

      b0bc6e1b5cf1987fa6301e836d3b9981bd62299434436c58829214e13937d327

    • SHA512

      5c379038ce3733a23fd0ce82906288d20192ae99d648ed129f1af096c19aef976844640b5dac738da53c930e1920f6f7d0839e06392927f8bbb433b13f2b9a17

    • SSDEEP

      1536:1RxzO/8Vc2S6aoWMzyin8YSHAU3AJnLqnw/q+T+Ff8BB3KI9M4+/ouT0Cj8F:r1O/8Zzyi8Y/U3S+mBB3KIY0g8F

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks