General

  • Target

    253adf5d522667791743e91cf2ec4766_JaffaCakes118

  • Size

    64KB

  • Sample

    241008-zk187ayeqd

  • MD5

    253adf5d522667791743e91cf2ec4766

  • SHA1

    b8f65775bd6eba5fdb1c131be56afdbb2ad6fc55

  • SHA256

    c0f17afc056794f5d6ae989b9e4c5cbb8cefc85e109d2fc14cc70a065f7fcc84

  • SHA512

    1f8b401a95c4fb174cebdc95d6e9792d3eadb2de2c41e184583aa408140189bcf09b25486dbcb12c6206aaa22149220d6b2cb6e3712126b634ebc0edfad8a0b3

  • SSDEEP

    1536:uXcPE4lW2BBS+9i2XJBjHgKMvguddoY/1SA0:u0XBBDJAKMooUA0

Malware Config

Targets

    • Target

      253adf5d522667791743e91cf2ec4766_JaffaCakes118

    • Size

      64KB

    • MD5

      253adf5d522667791743e91cf2ec4766

    • SHA1

      b8f65775bd6eba5fdb1c131be56afdbb2ad6fc55

    • SHA256

      c0f17afc056794f5d6ae989b9e4c5cbb8cefc85e109d2fc14cc70a065f7fcc84

    • SHA512

      1f8b401a95c4fb174cebdc95d6e9792d3eadb2de2c41e184583aa408140189bcf09b25486dbcb12c6206aaa22149220d6b2cb6e3712126b634ebc0edfad8a0b3

    • SSDEEP

      1536:uXcPE4lW2BBS+9i2XJBjHgKMvguddoY/1SA0:u0XBBDJAKMooUA0

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks