General

  • Target

    371c9839706c0cb12a427f889568ae45_JaffaCakes118

  • Size

    100KB

  • Sample

    240711-bcztdsscrh

  • MD5

    371c9839706c0cb12a427f889568ae45

  • SHA1

    b2e824f7018bf4dbbf8982a0434852b86fc8198c

  • SHA256

    e9a59755d801985147bcb7fc98a6e4e2809d82c309bec63d8eef323302c9f072

  • SHA512

    6adbe73546d19370e435171301cf66cf5d84adb8ae23ce423eba133418384cc9fb8cdaf322069481c383f66cf47f45a69161e07aa742bb2490c76416d61b44ff

  • SSDEEP

    1536:GL5kvBPedEWOYEua9yz2cPOY4atvnYHZ/UMg0Yl5Lgo4zHYRIA:GLIPedt1EuatcWzUKcx0YPLgo47Y

Malware Config

Targets

    • Target

      371c9839706c0cb12a427f889568ae45_JaffaCakes118

    • Size

      100KB

    • MD5

      371c9839706c0cb12a427f889568ae45

    • SHA1

      b2e824f7018bf4dbbf8982a0434852b86fc8198c

    • SHA256

      e9a59755d801985147bcb7fc98a6e4e2809d82c309bec63d8eef323302c9f072

    • SHA512

      6adbe73546d19370e435171301cf66cf5d84adb8ae23ce423eba133418384cc9fb8cdaf322069481c383f66cf47f45a69161e07aa742bb2490c76416d61b44ff

    • SSDEEP

      1536:GL5kvBPedEWOYEua9yz2cPOY4atvnYHZ/UMg0Yl5Lgo4zHYRIA:GLIPedt1EuatcWzUKcx0YPLgo47Y

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks