General

  • Target

    20dc150465717c2460817319eeb32203_JaffaCakes118

  • Size

    36KB

  • Sample

    240703-dhl6layckl

  • MD5

    20dc150465717c2460817319eeb32203

  • SHA1

    85fc12332cbf415dd91cdabf46888dca353d89f7

  • SHA256

    a1f7544ab1fcd02531c50c25d0dc74c2aaaa0e592ea7d2d0194cee3c66e9114c

  • SHA512

    3d6ab6ddca97937b6d5366520bf02aa011af8f8576d8f17d90312344a9245320ed7d6f6ae233e9457ccf21686ce5780cfbe6a865fb8dda90c182235866e623f7

  • SSDEEP

    768:DfZ2YidJN5kXcyXrCD1tDMByGqnxGm3+IdW:DedEcyXrC/GsnsGdW

Malware Config

Targets

    • Target

      20dc150465717c2460817319eeb32203_JaffaCakes118

    • Size

      36KB

    • MD5

      20dc150465717c2460817319eeb32203

    • SHA1

      85fc12332cbf415dd91cdabf46888dca353d89f7

    • SHA256

      a1f7544ab1fcd02531c50c25d0dc74c2aaaa0e592ea7d2d0194cee3c66e9114c

    • SHA512

      3d6ab6ddca97937b6d5366520bf02aa011af8f8576d8f17d90312344a9245320ed7d6f6ae233e9457ccf21686ce5780cfbe6a865fb8dda90c182235866e623f7

    • SSDEEP

      768:DfZ2YidJN5kXcyXrCD1tDMByGqnxGm3+IdW:DedEcyXrC/GsnsGdW

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks