General

  • Target

    9f0ffa8f343c5b468f4d1e3dc40903df_JaffaCakes118

  • Size

    196KB

  • Sample

    241126-bxxjrstmel

  • MD5

    9f0ffa8f343c5b468f4d1e3dc40903df

  • SHA1

    6b4fe06652eeb237c82e2c7fcd3367652f5f7fe8

  • SHA256

    f60a4fc593882707099a93cc277a50ba465c930397dbbe08df796a0611952310

  • SHA512

    54408bfe7829e47811bcc81a42a791e9f45bea2b49c098bd768f65a5ca44268f7b27cba6bafef209c59c343af97dc0132813b9fa46d6e9f8c879d86ed04f1879

  • SSDEEP

    3072:ZjA1GSDzxC274waHQOBxJBg/dR4nRtOJtE4o1CCDNcm19brOd2fRv:pAPQOCHNBXBDrOICCDCm19fOofd

Malware Config

Targets

    • Target

      9f0ffa8f343c5b468f4d1e3dc40903df_JaffaCakes118

    • Size

      196KB

    • MD5

      9f0ffa8f343c5b468f4d1e3dc40903df

    • SHA1

      6b4fe06652eeb237c82e2c7fcd3367652f5f7fe8

    • SHA256

      f60a4fc593882707099a93cc277a50ba465c930397dbbe08df796a0611952310

    • SHA512

      54408bfe7829e47811bcc81a42a791e9f45bea2b49c098bd768f65a5ca44268f7b27cba6bafef209c59c343af97dc0132813b9fa46d6e9f8c879d86ed04f1879

    • SSDEEP

      3072:ZjA1GSDzxC274waHQOBxJBg/dR4nRtOJtE4o1CCDNcm19brOd2fRv:pAPQOCHNBXBDrOICCDCm19fOofd

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks