General

  • Target

    4b1ca3ee4b4e7e855cb9849ac02e7898_JaffaCakes118

  • Size

    47KB

  • Sample

    240715-ydaxzsydlg

  • MD5

    4b1ca3ee4b4e7e855cb9849ac02e7898

  • SHA1

    5ab0476443aacecae5b6863a8e9df5237ed4de1b

  • SHA256

    03e50913ea44a8df4922f120a68310b7f812350efe6b1440e631ffbf7a3bcbf3

  • SHA512

    d8e1a19f1afe1103d582444f2fbfbec48b844d528d24b21216846dbcc505a3d90045dc14fb3803a1c46ae53d517a632016eb14842622938ade1422f711d0ccd6

  • SSDEEP

    768:6GhkO9USNJw5Oy1Ukx0Aq9h+rcfeswjf3SFnNuXYLnW7N+o+zEui:6GrzwQyuk6X+rcfe9jLIo+Fz

Score
7/10

Malware Config

Targets

    • Target

      4b1ca3ee4b4e7e855cb9849ac02e7898_JaffaCakes118

    • Size

      47KB

    • MD5

      4b1ca3ee4b4e7e855cb9849ac02e7898

    • SHA1

      5ab0476443aacecae5b6863a8e9df5237ed4de1b

    • SHA256

      03e50913ea44a8df4922f120a68310b7f812350efe6b1440e631ffbf7a3bcbf3

    • SHA512

      d8e1a19f1afe1103d582444f2fbfbec48b844d528d24b21216846dbcc505a3d90045dc14fb3803a1c46ae53d517a632016eb14842622938ade1422f711d0ccd6

    • SSDEEP

      768:6GhkO9USNJw5Oy1Ukx0Aq9h+rcfeswjf3SFnNuXYLnW7N+o+zEui:6GrzwQyuk6X+rcfe9jLIo+Fz

    Score
    7/10
    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks