General

  • Target

    37f489586894fa49acace9ed38b9ae2f_JaffaCakes118

  • Size

    36KB

  • Sample

    240711-gn38vavcjc

  • MD5

    37f489586894fa49acace9ed38b9ae2f

  • SHA1

    3232eeaabe1aca7233985d79f981de9ef81dd4dc

  • SHA256

    5903dfafdeaa7af645da15f927869d949c8bdeb066c0cdb1cadd1dac28343016

  • SHA512

    547a89473b03a25f85ae6ac95dde8e1d9b7ec5955ad1c1f197c555e4bea8327f1d7f993a0553e0493f39f488e78cf3bf5ef2f7f9c32620b70ac5d16f9fdbece2

  • SSDEEP

    768:TfZ2YidJN5kXcyXrCD1tDMByGqnxGm3+IdW:TedEcyXrC/GsnsGdW

Malware Config

Targets

    • Target

      37f489586894fa49acace9ed38b9ae2f_JaffaCakes118

    • Size

      36KB

    • MD5

      37f489586894fa49acace9ed38b9ae2f

    • SHA1

      3232eeaabe1aca7233985d79f981de9ef81dd4dc

    • SHA256

      5903dfafdeaa7af645da15f927869d949c8bdeb066c0cdb1cadd1dac28343016

    • SHA512

      547a89473b03a25f85ae6ac95dde8e1d9b7ec5955ad1c1f197c555e4bea8327f1d7f993a0553e0493f39f488e78cf3bf5ef2f7f9c32620b70ac5d16f9fdbece2

    • SSDEEP

      768:TfZ2YidJN5kXcyXrCD1tDMByGqnxGm3+IdW:TedEcyXrC/GsnsGdW

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks