General

  • Target

    JaffaCakes118_8adf6842ada41070f5641c9f12b8355b

  • Size

    873KB

  • Sample

    250328-v3bn2a1ls8

  • MD5

    8adf6842ada41070f5641c9f12b8355b

  • SHA1

    d1b40b79a724493efd7f8b543aa8373cd3039670

  • SHA256

    1417f614b61d200bdd0daf0443a170aab206e9f1b58e2cf987731ede80c91ff8

  • SHA512

    1033558e2916de3ea94520f03ff9ea8cc45b841456ae54ebfa8f2c6e770b68cb38d3a96116c702d2de06a0b474fefa9b15bfb8520195f9837e7af60b89f5df04

  • SSDEEP

    12288:Di/GwLX7ycU1D4HZbRDZ6acKkATHW38wFA+ewSUO5IOPOZl4vBTl+fHU4GIRR0SM:DAGZhDEJhZvW3NAYSUZL4pV4GY9rO

Malware Config

Targets

    • Target

      JaffaCakes118_8adf6842ada41070f5641c9f12b8355b

    • Size

      873KB

    • MD5

      8adf6842ada41070f5641c9f12b8355b

    • SHA1

      d1b40b79a724493efd7f8b543aa8373cd3039670

    • SHA256

      1417f614b61d200bdd0daf0443a170aab206e9f1b58e2cf987731ede80c91ff8

    • SHA512

      1033558e2916de3ea94520f03ff9ea8cc45b841456ae54ebfa8f2c6e770b68cb38d3a96116c702d2de06a0b474fefa9b15bfb8520195f9837e7af60b89f5df04

    • SSDEEP

      12288:Di/GwLX7ycU1D4HZbRDZ6acKkATHW38wFA+ewSUO5IOPOZl4vBTl+fHU4GIRR0SM:DAGZhDEJhZvW3NAYSUZL4pV4GY9rO

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks