General

  • Target

    6912cecd2b583db51b030f68d6d5ec57_JaffaCakes118

  • Size

    36KB

  • Sample

    240723-1pwpyazhqq

  • MD5

    6912cecd2b583db51b030f68d6d5ec57

  • SHA1

    5f243ac9161bc8d961c3e0344014a20f0edcd372

  • SHA256

    2c2deca92b5b925df444bfe27da4fb908c64c3dacd97b101d071f76b0e8727e6

  • SHA512

    b548fd445e884308e3917adfaef5270bd432ff7d854b84673e699ac7024f246ac5ede120a934e288e06e645b0419c769a4c8f904ad3eec88f41c85bfebad25f4

  • SSDEEP

    384:1OgGIbRJpai9c49Wigp5/y+ixe1+B6BDR+v+I7J3SvwKF58o2iU+:/jgiGxy+is1M6BDRK97J3+ZFWo2iU+

Malware Config

Targets

    • Target

      6912cecd2b583db51b030f68d6d5ec57_JaffaCakes118

    • Size

      36KB

    • MD5

      6912cecd2b583db51b030f68d6d5ec57

    • SHA1

      5f243ac9161bc8d961c3e0344014a20f0edcd372

    • SHA256

      2c2deca92b5b925df444bfe27da4fb908c64c3dacd97b101d071f76b0e8727e6

    • SHA512

      b548fd445e884308e3917adfaef5270bd432ff7d854b84673e699ac7024f246ac5ede120a934e288e06e645b0419c769a4c8f904ad3eec88f41c85bfebad25f4

    • SSDEEP

      384:1OgGIbRJpai9c49Wigp5/y+ixe1+B6BDR+v+I7J3SvwKF58o2iU+:/jgiGxy+is1M6BDRK97J3+ZFWo2iU+

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks