General

  • Target

    3411a80d745c0546341e54a91088caf0_JaffaCakes118

  • Size

    100KB

  • Sample

    240710-kxf2fsyckq

  • MD5

    3411a80d745c0546341e54a91088caf0

  • SHA1

    5ff9c62e56b304d5ad4ada7094b202a9241fbbf1

  • SHA256

    7e4cc77f0828325f70a874cfba2f2346a5f15de563d85413fb5bc6bff059f240

  • SHA512

    14953ef3e002d2e68c2fb27bb67d9f3eb2a7ecf9851f14eea77ed60e6efec712ead26de797674fbd4a5e3e5a96cebf0332c198ab3cb2794e27ac132ca9d71bf7

  • SSDEEP

    3072:U3/x+47UDjnBPq0B3mPO1WXaYY9Wqfgo2Y:Uv847UfnBHmW1T79W7Y

Malware Config

Targets

    • Target

      3411a80d745c0546341e54a91088caf0_JaffaCakes118

    • Size

      100KB

    • MD5

      3411a80d745c0546341e54a91088caf0

    • SHA1

      5ff9c62e56b304d5ad4ada7094b202a9241fbbf1

    • SHA256

      7e4cc77f0828325f70a874cfba2f2346a5f15de563d85413fb5bc6bff059f240

    • SHA512

      14953ef3e002d2e68c2fb27bb67d9f3eb2a7ecf9851f14eea77ed60e6efec712ead26de797674fbd4a5e3e5a96cebf0332c198ab3cb2794e27ac132ca9d71bf7

    • SSDEEP

      3072:U3/x+47UDjnBPq0B3mPO1WXaYY9Wqfgo2Y:Uv847UfnBHmW1T79W7Y

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks