General

  • Target

    8f2b662be5f27f7007cfbd3f6fd63723_JaffaCakes118

  • Size

    203KB

  • Sample

    241104-e4xpwsthpn

  • MD5

    8f2b662be5f27f7007cfbd3f6fd63723

  • SHA1

    06720ea4fbe535bb5e5071cc04e9dd8ba43cf106

  • SHA256

    e13b78fdbaa874943a93a202d903821056442a5a9195c501768e83326b7a288d

  • SHA512

    eaeafe00f3fddcea7537640d9d7aa8563fb0bea87e17780081bc8dc4c68ab9c2828dbf8731f43d305dc5dc53840df55598693327c3eb65cdb3f9a1e5204cb85c

  • SSDEEP

    6144:AMogsc4kLSyjes0q6byvfb/5E3MvYJSB8OztllT/:AMUjYr6qfbBVYJZWt3/

Malware Config

Targets

    • Target

      8f2b662be5f27f7007cfbd3f6fd63723_JaffaCakes118

    • Size

      203KB

    • MD5

      8f2b662be5f27f7007cfbd3f6fd63723

    • SHA1

      06720ea4fbe535bb5e5071cc04e9dd8ba43cf106

    • SHA256

      e13b78fdbaa874943a93a202d903821056442a5a9195c501768e83326b7a288d

    • SHA512

      eaeafe00f3fddcea7537640d9d7aa8563fb0bea87e17780081bc8dc4c68ab9c2828dbf8731f43d305dc5dc53840df55598693327c3eb65cdb3f9a1e5204cb85c

    • SSDEEP

      6144:AMogsc4kLSyjes0q6byvfb/5E3MvYJSB8OztllT/:AMUjYr6qfbBVYJZWt3/

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks