General

  • Target

    227f22d5ab611ca0f7fb704b0693bf7f_JaffaCakes118

  • Size

    100KB

  • Sample

    240703-qnl41ayajg

  • MD5

    227f22d5ab611ca0f7fb704b0693bf7f

  • SHA1

    b2abe0af103da350825b8fb7810cce9bd732523f

  • SHA256

    c3af043a2931ff926480b8e02a2504002a962a04c805840d29fa68b5a53746c3

  • SHA512

    53942ac644811e81b198dcccc56532cf0d57758d5deedb2d098827fcce04e9fa00757e42c3c23a436f4cba39b5e59b109471f41a78b06c853cdef405ceace21c

  • SSDEEP

    3072:2nplSG6aGqw/Thy4q/XDgO5WTPMGVx0YPLgo47Y:qp+aK04QtWTUMNI7Y

Malware Config

Targets

    • Target

      227f22d5ab611ca0f7fb704b0693bf7f_JaffaCakes118

    • Size

      100KB

    • MD5

      227f22d5ab611ca0f7fb704b0693bf7f

    • SHA1

      b2abe0af103da350825b8fb7810cce9bd732523f

    • SHA256

      c3af043a2931ff926480b8e02a2504002a962a04c805840d29fa68b5a53746c3

    • SHA512

      53942ac644811e81b198dcccc56532cf0d57758d5deedb2d098827fcce04e9fa00757e42c3c23a436f4cba39b5e59b109471f41a78b06c853cdef405ceace21c

    • SSDEEP

      3072:2nplSG6aGqw/Thy4q/XDgO5WTPMGVx0YPLgo47Y:qp+aK04QtWTUMNI7Y

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks