General

  • Target

    af7d5280ce29a8e77d97d9003fe55fb2_JaffaCakes118

  • Size

    5.3MB

  • Sample

    240615-vn982ssarq

  • MD5

    af7d5280ce29a8e77d97d9003fe55fb2

  • SHA1

    3d4e826874f0d6ab79fe644a00e49fdde241a453

  • SHA256

    ef8aaed1c045940a3ffb77151586b7af057a5445f7debb1e2b04225b2f9415ad

  • SHA512

    62c5623a8c5ccd5d706315b72d93e3b0c90c0552a0e281919c0f509e2795454021e2bf5717c4edb55f9e23f7cd5dcd55cde18724f1b0a91629aba5d1f6c3b55a

  • SSDEEP

    98304:xonocowoBowo1oao0oeo6o4o6ononoqoLRH2D92LIM/+ZdEi5azMH9752TiBvHDl:aov7q7G9X5dzdooNFWDy/+Zta4xi0D6M

Malware Config

Targets

    • Target

      af7d5280ce29a8e77d97d9003fe55fb2_JaffaCakes118

    • Size

      5.3MB

    • MD5

      af7d5280ce29a8e77d97d9003fe55fb2

    • SHA1

      3d4e826874f0d6ab79fe644a00e49fdde241a453

    • SHA256

      ef8aaed1c045940a3ffb77151586b7af057a5445f7debb1e2b04225b2f9415ad

    • SHA512

      62c5623a8c5ccd5d706315b72d93e3b0c90c0552a0e281919c0f509e2795454021e2bf5717c4edb55f9e23f7cd5dcd55cde18724f1b0a91629aba5d1f6c3b55a

    • SSDEEP

      98304:xonocowoBowo1oao0oeo6o4o6ononoqoLRH2D92LIM/+ZdEi5azMH9752TiBvHDl:aov7q7G9X5dzdooNFWDy/+Zta4xi0D6M

    Score
    7/10
    • Installer Packages

      Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Installer packages are OS specific and contain the resources an operating system needs to install applications on a system.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks