General

  • Target

    JaffaCakes118_458c2a91b614f82bf3959e22a15de680

  • Size

    420KB

  • Sample

    250101-d13ajawjaj

  • MD5

    458c2a91b614f82bf3959e22a15de680

  • SHA1

    37461e8d260ae14c0a4dc459fe10bee4ff24a8dd

  • SHA256

    9e1251e4d0fa1234489cf5cedda38eed70b809efef6e34a81e7238f8c9e5824d

  • SHA512

    1ce65d626c55b82d5e4a7635aa3bc6924fa0bf3d3ddb4dbe9702fbf8f02c3a15ab480a73b5f90090abdaa5756c925830321a9a98990722f7c7ee72e741b471e6

  • SSDEEP

    6144:x6YI4ud53eGWtV7BH4Uc7zsbU10Ie4JoDQxCh2FOMQ:TqeER7zeTIeOoMre

Malware Config

Targets

    • Target

      JaffaCakes118_458c2a91b614f82bf3959e22a15de680

    • Size

      420KB

    • MD5

      458c2a91b614f82bf3959e22a15de680

    • SHA1

      37461e8d260ae14c0a4dc459fe10bee4ff24a8dd

    • SHA256

      9e1251e4d0fa1234489cf5cedda38eed70b809efef6e34a81e7238f8c9e5824d

    • SHA512

      1ce65d626c55b82d5e4a7635aa3bc6924fa0bf3d3ddb4dbe9702fbf8f02c3a15ab480a73b5f90090abdaa5756c925830321a9a98990722f7c7ee72e741b471e6

    • SSDEEP

      6144:x6YI4ud53eGWtV7BH4Uc7zsbU10Ie4JoDQxCh2FOMQ:TqeER7zeTIeOoMre

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks