General

  • Target

    6f523f83d18ec6c65d51d4c6332c3fb3_JaffaCakes118

  • Size

    113KB

  • Sample

    240725-m9jzzsybla

  • MD5

    6f523f83d18ec6c65d51d4c6332c3fb3

  • SHA1

    018d6b10e817eccf100c2893a8384b4dfd77f519

  • SHA256

    2bb99ea89740aaa23b55b1d5cb79d37a9d8ab6d88e0e97b47492a0382ceedf31

  • SHA512

    175ef301c98dfc8d9bfe83835493a45ad732e54b1ae195e80d932650232b3c8cb328c13a55d90d628c5e540616ef162e4a3379b0bfb54f5e6326168d618fa454

  • SSDEEP

    3072:oBHlzvXs3x03deS6g5D7I55SYTcLryzSzv:ocxszM5p22zS

Malware Config

Targets

    • Target

      6f523f83d18ec6c65d51d4c6332c3fb3_JaffaCakes118

    • Size

      113KB

    • MD5

      6f523f83d18ec6c65d51d4c6332c3fb3

    • SHA1

      018d6b10e817eccf100c2893a8384b4dfd77f519

    • SHA256

      2bb99ea89740aaa23b55b1d5cb79d37a9d8ab6d88e0e97b47492a0382ceedf31

    • SHA512

      175ef301c98dfc8d9bfe83835493a45ad732e54b1ae195e80d932650232b3c8cb328c13a55d90d628c5e540616ef162e4a3379b0bfb54f5e6326168d618fa454

    • SSDEEP

      3072:oBHlzvXs3x03deS6g5D7I55SYTcLryzSzv:ocxszM5p22zS

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks