General

  • Target

    3719d4f30788a3d1453c04918e464fd0_JaffaCakes118

  • Size

    7KB

  • Sample

    240711-bajdmascjd

  • MD5

    3719d4f30788a3d1453c04918e464fd0

  • SHA1

    a554e6a886add417413071091e1d37be48ffd94a

  • SHA256

    f65af49f1ec5b4a2a92a9a8dea733a8717c8400ca46c2a57ab367fc3531a2732

  • SHA512

    b6b60b007ac14fc51b99751593246fe8a5d5c67c94786364d980713a018279cd89526035734c05c16d603341dcd3f5d73fcddbadb7f06bd6d75e4fcb4df9668f

  • SSDEEP

    192:MktTj/ekJOC1xEpCCB1ExR4+gG9/Pdf+9mY:Mkt3/hafYW+gGZPd

Malware Config

Targets

    • Target

      3719d4f30788a3d1453c04918e464fd0_JaffaCakes118

    • Size

      7KB

    • MD5

      3719d4f30788a3d1453c04918e464fd0

    • SHA1

      a554e6a886add417413071091e1d37be48ffd94a

    • SHA256

      f65af49f1ec5b4a2a92a9a8dea733a8717c8400ca46c2a57ab367fc3531a2732

    • SHA512

      b6b60b007ac14fc51b99751593246fe8a5d5c67c94786364d980713a018279cd89526035734c05c16d603341dcd3f5d73fcddbadb7f06bd6d75e4fcb4df9668f

    • SSDEEP

      192:MktTj/ekJOC1xEpCCB1ExR4+gG9/Pdf+9mY:Mkt3/hafYW+gGZPd

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

MITRE ATT&CK Enterprise v15

Tasks