General

  • Target

    69b2a9376a677471b73342c906c93490_JaffaCakes118

  • Size

    288KB

  • Sample

    240724-bklxhasflf

  • MD5

    69b2a9376a677471b73342c906c93490

  • SHA1

    aaed3f756182f2ddcbcdfaffd710ba38bae3dbd8

  • SHA256

    c209cef4bc793dd8cc09781cfaafa3116511646160f903660513a00ae634f6e9

  • SHA512

    8e57bc16e61ba26091188050291eff839f06613b8855a2c3b362a579fd3ff5d58f8ec018ea4064413d0fef9f517750c6c2722754d7d3e914efdad322fe13e5a3

  • SSDEEP

    6144:oiwf33S0j7y/8jzqcv18/O4+EJCLKSkHaCDO:A35jrx8/O43PSeD

Malware Config

Targets

    • Target

      69b2a9376a677471b73342c906c93490_JaffaCakes118

    • Size

      288KB

    • MD5

      69b2a9376a677471b73342c906c93490

    • SHA1

      aaed3f756182f2ddcbcdfaffd710ba38bae3dbd8

    • SHA256

      c209cef4bc793dd8cc09781cfaafa3116511646160f903660513a00ae634f6e9

    • SHA512

      8e57bc16e61ba26091188050291eff839f06613b8855a2c3b362a579fd3ff5d58f8ec018ea4064413d0fef9f517750c6c2722754d7d3e914efdad322fe13e5a3

    • SSDEEP

      6144:oiwf33S0j7y/8jzqcv18/O4+EJCLKSkHaCDO:A35jrx8/O43PSeD

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables taskbar notifications via registry modification

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks