General

  • Target

    2b437fa0582177d74b39a984309c3494_JaffaCakes118

  • Size

    32KB

  • Sample

    240708-gxx37ayaka

  • MD5

    2b437fa0582177d74b39a984309c3494

  • SHA1

    8610b6bc3fe2cb4c89d28eb8c0fbd93e8abb29f9

  • SHA256

    97785da4a12dc561c4881b43af3858d4c0665426e7752d45f079f827dd305e69

  • SHA512

    5de3928550a74acb96f004ac777cdeffc1e51afa9325696afd74d43c3e1621a5a73449ee9b4f1529a556f97a62012e77db8fbffe12f97dd1e126fa3ff616584d

  • SSDEEP

    768:nd7HQ9BrrmZZuNBo7Gh/4ONq2NfDx8deVpH:niRiZZBE/h6wH

Malware Config

Targets

    • Target

      2b437fa0582177d74b39a984309c3494_JaffaCakes118

    • Size

      32KB

    • MD5

      2b437fa0582177d74b39a984309c3494

    • SHA1

      8610b6bc3fe2cb4c89d28eb8c0fbd93e8abb29f9

    • SHA256

      97785da4a12dc561c4881b43af3858d4c0665426e7752d45f079f827dd305e69

    • SHA512

      5de3928550a74acb96f004ac777cdeffc1e51afa9325696afd74d43c3e1621a5a73449ee9b4f1529a556f97a62012e77db8fbffe12f97dd1e126fa3ff616584d

    • SSDEEP

      768:nd7HQ9BrrmZZuNBo7Gh/4ONq2NfDx8deVpH:niRiZZBE/h6wH

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Deletes itself

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks