General

  • Target

    63a9478357f9de4492515183b5a8aff0_JaffaCakes118

  • Size

    32KB

  • Sample

    240722-sgkzgavbkl

  • MD5

    63a9478357f9de4492515183b5a8aff0

  • SHA1

    1cdcb024c7acba66a572ea040568752024c6f536

  • SHA256

    c95c162e0265c03ea623dadc3534a783c93f42e7bb03b72f9cbf18098d7d7c46

  • SHA512

    d8c9a9d2e309e69d1f7b700c723363ec3cd6c702980f5a37f68d832a0412309a1741eb33e897bf4ce96edb729e35fc46d5e017c70a416eaabc53a561764f13e0

  • SSDEEP

    384:GaXSbS8RQP1RxVkosHVmWebRJZZPzAT0DyE7Q1Ww7//ChLu3/Y:GaXMssKbRJZ9zs0yQQ1W8/6hLu3/

Malware Config

Targets

    • Target

      63a9478357f9de4492515183b5a8aff0_JaffaCakes118

    • Size

      32KB

    • MD5

      63a9478357f9de4492515183b5a8aff0

    • SHA1

      1cdcb024c7acba66a572ea040568752024c6f536

    • SHA256

      c95c162e0265c03ea623dadc3534a783c93f42e7bb03b72f9cbf18098d7d7c46

    • SHA512

      d8c9a9d2e309e69d1f7b700c723363ec3cd6c702980f5a37f68d832a0412309a1741eb33e897bf4ce96edb729e35fc46d5e017c70a416eaabc53a561764f13e0

    • SSDEEP

      384:GaXSbS8RQP1RxVkosHVmWebRJZZPzAT0DyE7Q1Ww7//ChLu3/Y:GaXMssKbRJZ9zs0yQQ1W8/6hLu3/

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks