General

  • Target

    f2e172e42fedc4a33edbd4d858432049_JaffaCakes118

  • Size

    46KB

  • Sample

    240416-g4l99sdb5v

  • MD5

    f2e172e42fedc4a33edbd4d858432049

  • SHA1

    75e07fe29618b0279ac8441c84612a8dcfde7644

  • SHA256

    99f836e687aef659851a4bda6663f24f0bf32ca05a8ab99013d98d59aefdf35e

  • SHA512

    c91c334e696d0b2c47e06e92aefc54448b32955726a6864662bb56e55f989aefb58d761a0b491e87eba138d1a23e22078f32965c24660c23265d093b56d3f273

  • SSDEEP

    768:Ea19v3/BTkZLH2jFMujyV67JEzYmVkUWKvaL:h19vPBTkZLWB3uTV53

Malware Config

Targets

    • Target

      f2e172e42fedc4a33edbd4d858432049_JaffaCakes118

    • Size

      46KB

    • MD5

      f2e172e42fedc4a33edbd4d858432049

    • SHA1

      75e07fe29618b0279ac8441c84612a8dcfde7644

    • SHA256

      99f836e687aef659851a4bda6663f24f0bf32ca05a8ab99013d98d59aefdf35e

    • SHA512

      c91c334e696d0b2c47e06e92aefc54448b32955726a6864662bb56e55f989aefb58d761a0b491e87eba138d1a23e22078f32965c24660c23265d093b56d3f273

    • SSDEEP

      768:Ea19v3/BTkZLH2jFMujyV67JEzYmVkUWKvaL:h19vPBTkZLWB3uTV53

    • Office macro that triggers on suspicious action

      Office document macro which triggers in special circumstances - often malicious.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks