General

  • Target

    43df48435c711d6740ebc5cda269d889_JaffaCakes118

  • Size

    537KB

  • Sample

    241014-yevnsawgpm

  • MD5

    43df48435c711d6740ebc5cda269d889

  • SHA1

    3f00cd4a6b5f0c3a2a7b04f844366803a1f113c0

  • SHA256

    e5dd0004947f3a7321dba9825b4b7d34d842cccaa9995cbb8147ee70530a3121

  • SHA512

    da7dfb6aaa2778ae2e06f0e76e30208e4e938125763402f09695e7edba75ed69904c99f43b578b0f1c805ad8df0435cc7d6cf690013bface16da2b6f7fbc7c11

  • SSDEEP

    12288:cUJaxvrSCu77Z1RLeQiOfFHNv9FnKyY3hQzRyY5ykBMo1y53cKK22pULQTsq:zQ877j0WFHV9EyYRWRf5nBn05PwULGP

Malware Config

Targets

    • Target

      43df48435c711d6740ebc5cda269d889_JaffaCakes118

    • Size

      537KB

    • MD5

      43df48435c711d6740ebc5cda269d889

    • SHA1

      3f00cd4a6b5f0c3a2a7b04f844366803a1f113c0

    • SHA256

      e5dd0004947f3a7321dba9825b4b7d34d842cccaa9995cbb8147ee70530a3121

    • SHA512

      da7dfb6aaa2778ae2e06f0e76e30208e4e938125763402f09695e7edba75ed69904c99f43b578b0f1c805ad8df0435cc7d6cf690013bface16da2b6f7fbc7c11

    • SSDEEP

      12288:cUJaxvrSCu77Z1RLeQiOfFHNv9FnKyY3hQzRyY5ykBMo1y53cKK22pULQTsq:zQ877j0WFHV9EyYRWRf5nBn05PwULGP

    • Modifies WinLogon for persistence

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks