General

  • Target

    4925b9c17c5c0de34eedf258f8f4f374_JaffaCakes118

  • Size

    202KB

  • Sample

    240715-k6fr2s1hre

  • MD5

    4925b9c17c5c0de34eedf258f8f4f374

  • SHA1

    0a66255b71760d6fd467ad48c7be3816e32097c9

  • SHA256

    9a6a99e76ce170b6abda7ba6fbe18d492b5276db3ca68ed273de74e5cb564e42

  • SHA512

    dd49fb95737b42d93cbb3359ceefaa9fcecf3c4c66f22f19207cd513e2184524db666f0641f4896a43b817740b8d40c3c0cb99066d137795f750791be68295aa

  • SSDEEP

    6144:lkaoTSj1byLqohs0g7ltVXPeAayyQqxa1m:UGpbyLLhCJfkyylG

Malware Config

Targets

    • Target

      4925b9c17c5c0de34eedf258f8f4f374_JaffaCakes118

    • Size

      202KB

    • MD5

      4925b9c17c5c0de34eedf258f8f4f374

    • SHA1

      0a66255b71760d6fd467ad48c7be3816e32097c9

    • SHA256

      9a6a99e76ce170b6abda7ba6fbe18d492b5276db3ca68ed273de74e5cb564e42

    • SHA512

      dd49fb95737b42d93cbb3359ceefaa9fcecf3c4c66f22f19207cd513e2184524db666f0641f4896a43b817740b8d40c3c0cb99066d137795f750791be68295aa

    • SSDEEP

      6144:lkaoTSj1byLqohs0g7ltVXPeAayyQqxa1m:UGpbyLLhCJfkyylG

    • Event Triggered Execution: AppCert DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks