General

  • Target

    8beab963a0d6b20212d6f402f47fa17b_JaffaCakes118

  • Size

    115KB

  • Sample

    240811-zlxx6axdrl

  • MD5

    8beab963a0d6b20212d6f402f47fa17b

  • SHA1

    eb8619695cb5170a835b62c58e6d3b5a89e30546

  • SHA256

    33d14dfa8b46e0d10c9dbba80aaf53587dfefb2b3814c9b44583a64e71b2bed0

  • SHA512

    504b520006c2b41ab208545498a9de333f36f61eb83d16f2e6039d20df1dd169e20778619c45ffb5cd9a35606560210bc1dc5aef80d4e471752b4abad0c4e5ef

  • SSDEEP

    3072:eGaK4XabO7xlI8r9iJw7AzAAn/6asu1TUybroaUKZt:QpCzAiAu14yfoFKZ

Malware Config

Targets

    • Target

      8beab963a0d6b20212d6f402f47fa17b_JaffaCakes118

    • Size

      115KB

    • MD5

      8beab963a0d6b20212d6f402f47fa17b

    • SHA1

      eb8619695cb5170a835b62c58e6d3b5a89e30546

    • SHA256

      33d14dfa8b46e0d10c9dbba80aaf53587dfefb2b3814c9b44583a64e71b2bed0

    • SHA512

      504b520006c2b41ab208545498a9de333f36f61eb83d16f2e6039d20df1dd169e20778619c45ffb5cd9a35606560210bc1dc5aef80d4e471752b4abad0c4e5ef

    • SSDEEP

      3072:eGaK4XabO7xlI8r9iJw7AzAAn/6asu1TUybroaUKZt:QpCzAiAu14yfoFKZ

    • Boot or Logon Autostart Execution: Print Processors

      Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks