General

  • Target

    JaffaCakes118_9462b737c1559858d26f4d49ff0341ab

  • Size

    125KB

  • Sample

    250329-x1rctaz1bw

  • MD5

    9462b737c1559858d26f4d49ff0341ab

  • SHA1

    b7b15bfcb2a0dc1c4d82560987df4828f5c3742a

  • SHA256

    3e7158db9e3287b1a3fc89b3b7b609e4879e553c7d59cfddc0117fa764b4844f

  • SHA512

    d0e6c9eae2390b1991fb2d533d1f195fa2d7387d966f033312d979899d5bee6979e4497546eb3b8d513c81e91b5c3b2edfbc085177ca2b1f0be4cf03344e6586

  • SSDEEP

    3072:K7pn7qMJA3QLOmQX1McZhrdp37hEriLzVecQe5:Gjy3VX/ZxAi1ecd

Malware Config

Targets

    • Target

      JaffaCakes118_9462b737c1559858d26f4d49ff0341ab

    • Size

      125KB

    • MD5

      9462b737c1559858d26f4d49ff0341ab

    • SHA1

      b7b15bfcb2a0dc1c4d82560987df4828f5c3742a

    • SHA256

      3e7158db9e3287b1a3fc89b3b7b609e4879e553c7d59cfddc0117fa764b4844f

    • SHA512

      d0e6c9eae2390b1991fb2d533d1f195fa2d7387d966f033312d979899d5bee6979e4497546eb3b8d513c81e91b5c3b2edfbc085177ca2b1f0be4cf03344e6586

    • SSDEEP

      3072:K7pn7qMJA3QLOmQX1McZhrdp37hEriLzVecQe5:Gjy3VX/ZxAi1ecd

    • Modifies WinLogon for persistence

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks