General

  • Target

    68436318693954e7fb53963df3ddbf41_JaffaCakes118

  • Size

    25KB

  • Sample

    240723-tldavsybpn

  • MD5

    68436318693954e7fb53963df3ddbf41

  • SHA1

    e3a620a923646c54c5dc5c56d18b6c93cf4956f3

  • SHA256

    a72e32c8ed70835ef7b0f75a1715fbfd9c882d719778e5fb051701683f824ba1

  • SHA512

    1ce651f88c3423c9f7b03d891dfffc2e3b8b7f9f607581d22c0304eaf335421f204b040b60c55ba23bbabc39c7714587fabcc5b0b2aa57281b347f8453ee305e

  • SSDEEP

    384:XAC8aUZpCyG5U2lWKUKR5IaTk3m1Y21VmE7:XH8VZpCX5blxjInvWVmE7

Malware Config

Targets

    • Target

      68436318693954e7fb53963df3ddbf41_JaffaCakes118

    • Size

      25KB

    • MD5

      68436318693954e7fb53963df3ddbf41

    • SHA1

      e3a620a923646c54c5dc5c56d18b6c93cf4956f3

    • SHA256

      a72e32c8ed70835ef7b0f75a1715fbfd9c882d719778e5fb051701683f824ba1

    • SHA512

      1ce651f88c3423c9f7b03d891dfffc2e3b8b7f9f607581d22c0304eaf335421f204b040b60c55ba23bbabc39c7714587fabcc5b0b2aa57281b347f8453ee305e

    • SSDEEP

      384:XAC8aUZpCyG5U2lWKUKR5IaTk3m1Y21VmE7:XH8VZpCX5blxjInvWVmE7

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks