General

  • Target

    442625ceb0a7cb3c6a57c30c6ac4ba26_JaffaCakes118

  • Size

    464KB

  • Sample

    241014-zrad2szeqp

  • MD5

    442625ceb0a7cb3c6a57c30c6ac4ba26

  • SHA1

    eab3896ef668df53aae3db044dff9ff7892ad98c

  • SHA256

    f99de4ca8be78b25bf6584eea5232adaa1bc07426faa7b5ecd6518a5a6ba8977

  • SHA512

    c6abdddc9b5492259d163fa711022184cb5b49672d574887f47b0cee6c009d9c615e8c3d108d79859bd6c633d76364e3d242f9c484635526f32db26d727eb3b9

  • SSDEEP

    12288:xf3o/0XXUggUnkyW8k2oUlCiiSGUqaUt7ln:xz5gQrRk2o9iXOh

Malware Config

Targets

    • Target

      442625ceb0a7cb3c6a57c30c6ac4ba26_JaffaCakes118

    • Size

      464KB

    • MD5

      442625ceb0a7cb3c6a57c30c6ac4ba26

    • SHA1

      eab3896ef668df53aae3db044dff9ff7892ad98c

    • SHA256

      f99de4ca8be78b25bf6584eea5232adaa1bc07426faa7b5ecd6518a5a6ba8977

    • SHA512

      c6abdddc9b5492259d163fa711022184cb5b49672d574887f47b0cee6c009d9c615e8c3d108d79859bd6c633d76364e3d242f9c484635526f32db26d727eb3b9

    • SSDEEP

      12288:xf3o/0XXUggUnkyW8k2oUlCiiSGUqaUt7ln:xz5gQrRk2o9iXOh

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks