General

  • Target

    39a9d8ff1f74347420171704e80a48b5_JaffaCakes118

  • Size

    77KB

  • Sample

    240711-spatgasarl

  • MD5

    39a9d8ff1f74347420171704e80a48b5

  • SHA1

    93698a5de44cb234d421365e715b23841ed37275

  • SHA256

    1f0134180b300d7c9f09cb3198d9106a512cf22e7017fdc0dce568f530da443e

  • SHA512

    7793a46b06051bccbc3ed2da28bf956887905037c42e25d0bc26582bcb1c658843eaadda29516717e25e73a62f8e560964df6e20c309dffb8a54355b60b19017

  • SSDEEP

    1536:K1UGTDpbylMqpCRsuJhjas5uDC7O+UkjGSGDoz:4olfpCThesEO7OMjoDoz

Malware Config

Targets

    • Target

      39a9d8ff1f74347420171704e80a48b5_JaffaCakes118

    • Size

      77KB

    • MD5

      39a9d8ff1f74347420171704e80a48b5

    • SHA1

      93698a5de44cb234d421365e715b23841ed37275

    • SHA256

      1f0134180b300d7c9f09cb3198d9106a512cf22e7017fdc0dce568f530da443e

    • SHA512

      7793a46b06051bccbc3ed2da28bf956887905037c42e25d0bc26582bcb1c658843eaadda29516717e25e73a62f8e560964df6e20c309dffb8a54355b60b19017

    • SSDEEP

      1536:K1UGTDpbylMqpCRsuJhjas5uDC7O+UkjGSGDoz:4olfpCThesEO7OMjoDoz

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks