General

  • Target

    JaffaCakes118_9443e840ac07a44d629fd0f37d027252

  • Size

    363KB

  • Sample

    250329-xyx3kssk19

  • MD5

    9443e840ac07a44d629fd0f37d027252

  • SHA1

    cc116c036a943552fc407315b30a184e6efb0966

  • SHA256

    2e41bbaaee53c79ad69bd90a4d5bd4a6b8703aa5f90ebd154c9af0c63972c844

  • SHA512

    a10be712392bd7a52b2ca71f1237e0da2096cb1bcc77e9d509b8afc59973b06f69331c40815503379a1485aed4caed1fa3c3601c60860a1a067b2984052716d4

  • SSDEEP

    6144:yKWnMbzIHKAYx23WyCRxA9WhO4ZDSczLVwq9tXfzB/dvmrmab6yH:ywoqAY2WDRnO6dwq/X7Btzc

Malware Config

Targets

    • Target

      JaffaCakes118_9443e840ac07a44d629fd0f37d027252

    • Size

      363KB

    • MD5

      9443e840ac07a44d629fd0f37d027252

    • SHA1

      cc116c036a943552fc407315b30a184e6efb0966

    • SHA256

      2e41bbaaee53c79ad69bd90a4d5bd4a6b8703aa5f90ebd154c9af0c63972c844

    • SHA512

      a10be712392bd7a52b2ca71f1237e0da2096cb1bcc77e9d509b8afc59973b06f69331c40815503379a1485aed4caed1fa3c3601c60860a1a067b2984052716d4

    • SSDEEP

      6144:yKWnMbzIHKAYx23WyCRxA9WhO4ZDSczLVwq9tXfzB/dvmrmab6yH:ywoqAY2WDRnO6dwq/X7Btzc

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks