General

  • Target

    406f354a298ebe7d36a33131de108540_JaffaCakes118

  • Size

    92KB

  • Sample

    240713-gj4ntazhre

  • MD5

    406f354a298ebe7d36a33131de108540

  • SHA1

    de85baf79900539223bacd149634a55774919d67

  • SHA256

    e0813fac61541830266ea0aa088029b82808dd112aa5de0e752ba511fb2677f3

  • SHA512

    1da2f94e3f4f473e27a2632477cb6006c30e041e672b0fc0a3d777310e7e0c98067e7ff5f02c8b42c0edee22bfe967a5685588bf7700672346b1aea804f51dca

  • SSDEEP

    1536:QlaRCOWTG6z0ybXk2+dAdkwX5mbvaUAEhEacLfHwzGo:x0RDkHAkwXQDxyacszGo

Malware Config

Targets

    • Target

      406f354a298ebe7d36a33131de108540_JaffaCakes118

    • Size

      92KB

    • MD5

      406f354a298ebe7d36a33131de108540

    • SHA1

      de85baf79900539223bacd149634a55774919d67

    • SHA256

      e0813fac61541830266ea0aa088029b82808dd112aa5de0e752ba511fb2677f3

    • SHA512

      1da2f94e3f4f473e27a2632477cb6006c30e041e672b0fc0a3d777310e7e0c98067e7ff5f02c8b42c0edee22bfe967a5685588bf7700672346b1aea804f51dca

    • SSDEEP

      1536:QlaRCOWTG6z0ybXk2+dAdkwX5mbvaUAEhEacLfHwzGo:x0RDkHAkwXQDxyacszGo

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks