General

  • Target

    00d0427ba68d51a8a84d4b8d12f65621_JaffaCakes118

  • Size

    22KB

  • Sample

    240619-14vfestgpg

  • MD5

    00d0427ba68d51a8a84d4b8d12f65621

  • SHA1

    32fcc862235a596ea1c8260014112de6c4b42166

  • SHA256

    a6d8f70b893157e4055f6cc4a88098bc01bd89fb82f0e5703e7bcfe7629e49aa

  • SHA512

    411c0249505552d682d22f01274370ec2c34ce090698a390ad00d7b72a72b4ca4e17c9f46f016f1ae41e1680c248332cf72b5c6dad1b0ccdb1d9ec8d6ccbf962

  • SSDEEP

    384:ycPyZNjtU2mmQgALchib9oXfl1tsjHjku/zXZ0xW6KC0:/yZurJbyjtwDkuLXZ0xWS0

Malware Config

Targets

    • Target

      00d0427ba68d51a8a84d4b8d12f65621_JaffaCakes118

    • Size

      22KB

    • MD5

      00d0427ba68d51a8a84d4b8d12f65621

    • SHA1

      32fcc862235a596ea1c8260014112de6c4b42166

    • SHA256

      a6d8f70b893157e4055f6cc4a88098bc01bd89fb82f0e5703e7bcfe7629e49aa

    • SHA512

      411c0249505552d682d22f01274370ec2c34ce090698a390ad00d7b72a72b4ca4e17c9f46f016f1ae41e1680c248332cf72b5c6dad1b0ccdb1d9ec8d6ccbf962

    • SSDEEP

      384:ycPyZNjtU2mmQgALchib9oXfl1tsjHjku/zXZ0xW6KC0:/yZurJbyjtwDkuLXZ0xWS0

    • Modifies firewall policy service

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks