General

  • Target

    81cebb9b0e4ca293e6056d669b3358c7_JaffaCakes118

  • Size

    36KB

  • Sample

    240801-1feeasxbjm

  • MD5

    81cebb9b0e4ca293e6056d669b3358c7

  • SHA1

    cc25e45863228f2b6de277dc5121ec81c44d4515

  • SHA256

    6ec69206aecfa297a122d9746934e581a39fbc22f115ad2c31b872b77ef31fce

  • SHA512

    1ddb025fbc7b99dec3bc8b149030038295a0163456edd9131414ea38be61805817ac3f319eb65e0d6416e2bf15004b5c1b8618ea9b26115fb5140ff7364d0d29

  • SSDEEP

    768:VjgiGxy+iC146BDRK97J3+ZFWo2iU+DaLW:tMy+hQYFWuaLW

Malware Config

Targets

    • Target

      81cebb9b0e4ca293e6056d669b3358c7_JaffaCakes118

    • Size

      36KB

    • MD5

      81cebb9b0e4ca293e6056d669b3358c7

    • SHA1

      cc25e45863228f2b6de277dc5121ec81c44d4515

    • SHA256

      6ec69206aecfa297a122d9746934e581a39fbc22f115ad2c31b872b77ef31fce

    • SHA512

      1ddb025fbc7b99dec3bc8b149030038295a0163456edd9131414ea38be61805817ac3f319eb65e0d6416e2bf15004b5c1b8618ea9b26115fb5140ff7364d0d29

    • SSDEEP

      768:VjgiGxy+iC146BDRK97J3+ZFWo2iU+DaLW:tMy+hQYFWuaLW

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks